Limitations on practical quantum cryptography

@article{Brassard2000LimitationsOP,
  title={Limitations on practical quantum cryptography},
  author={Brassard and Lutkenhaus and Mor and Sanders},
  journal={Physical review letters},
  year={2000},
  volume={85 6},
  pages={
          1330-3
        }
}
We provide limits to practical quantum key distribution, taking into account channel losses, a realistic detection process, and imperfections in the "qubits" sent from the sender to the receiver. As we show, even quantum key distribution with perfect qubits might not be achievable over long distances when the other imperfections are taken into account. Furthermore, existing experimental schemes (based on weak pulses) currently do not offer unconditional security for the reported distances and… 
Fast and simple one-way quantum key distribution
TLDR
A new protocol for practical quantum cryptography, tailored for an implementation with weak coherent pulses to obtain a high key generation rate, featuring a high efficiency in terms of distilled secret bit per qubit.
Unconditional security of practical quantum key distribution
TLDR
This paper is identical to the preprint arXiv:quant-ph/0107017, which was finalized in 2001, therefore, some of the more recent developments, including the question of composability, are not addressed.
Attacks on Fixed Apparatus Quantum Key Distribution Schemes
TLDR
It is shown that, although theoretical quantum key distribution (QKD) is proven secure, such implementations are totally insecure against a strong eavesdropper that has a one-time access to the receiver's equipment.
Attacks on Fixed Apparatus Quantum Key Distribution Schemes
TLDR
The "fixed-apparatus attack" causes a potential risk to the usefulness of several recent quantum key distribution implementations, and is shown to be totally insecure against a strong eavesdropper that has one-time access to the receiver's equipment.
Megabits secure key rate quantum key distribution
TLDR
The differential phase shift (DPS) quantum key distribution (QKD) with an up-conversion-assisted hybrid photon detector (HPD) is implemented and achieved a 1.3 Mbits per second secure key rate over a 10 km fiber, which is tolerant against photon number splitting (PNS) attack, general collective attacks on individual photons and any other known sequential unambiguous state discrimination (USD) attacks.
Practical quantum key distribution with geometrically uniform states
TLDR
The protocol extends the ideas used in SARG04 to the limit where the core quantum communication is secure against unambiguous state discrimination and provides some level of inherent resistance to photon number splitting attacks.
Secure quantum key distribution with a single not-so-weak coherent pulse.
TLDR
The security of the QKD protocol, which counters the photon number splitting and the impersonation attacks, is analyzed and the possibility of quantum secure direct communication is discussed.
Practical quantum cryptography
TLDR
The first test of the QKD system using single photons produced by non-degenerate parametric down-conversion as a source is described and the main restriction on the distance range and the secure key rate is placed upon the weak coherent pulses.
Practical long-distance quantum key distribution system using decoy levels
Quantum key distribution (QKD) has the potential for widespread real-world applications, but no secure long-distance experiment has demonstrated the truly practical operation needed to move QKD from
Quantum Entanglement and Engineering 8 Quantum State Generation in Optical Frequency Combs for Quantum Computing
TLDR
An example side channel attack is introduced with the avalanche photodiode backflash attack, with results indicating the ability for this attack to, in principle, succeed.
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 53 REFERENCES
Quantum cryptography via parametric downconversion
TLDR
This work investigates another potential implementation of quantum key distribution: qubits generated using a process of parametric downconversion, and finds that, to first (two-photon) and second (four-Photon) order in the parametricDownconversion small parameter, this implementation is equivalent to the theoretical version.
Quantum cryptography with coherent states.
  • Huttner, Imoto, Gisin, Mor
  • Computer Science, Physics
    Physical review. A, Atomic, molecular, and optical physics
  • 1995
TLDR
This work discusses quantum cryptographic protocols based on the transmission of weak coherent states and presents a system, based on a symbiosis of two existing systems, for which the information available to the eavesdropper is significantly reduced and is therefore safer than the two previous ones.
Security against individual attacks for realistic quantum key distribution
TLDR
A formula for the secure bit rate per time slot of an experimental setup is obtained which can be used to optimize the performance of existing schemes for the considered scenario.
Experimental Quantum Cryptography
TLDR
Initial results from an apparatus and protocol designed to implement quantum public key distribution are described, by which two users exchange a random quantum transmission, consisting of very faint flashes of polarized light, which remains secure against an adversary with unlimited computing power.
Unconditional security in quantum cryptography
TLDR
Basic techniques to prove the unconditional security of quantum crypto graphy are described and a practical variation on the protocol in which the channel is noisy and photos may be lost during the transmission is considered.
Quantum cryptography using any two nonorthogonal states.
  • Bennett
  • Physics
    Physical review letters
  • 1992
TLDR
It is shown that in principle any two nonorthogonal quantum states suffice, and a practical interferometric realization using low-intensity coherent light pulses is described.
Quantum key distribution over distances as long as 30 km.
TLDR
Low error rates were obtained for the quantum transmissions, and error-free secret keys were distilled from the raw data by use of secure error-correction and privacy-amplification protocols.
Practical quantum cryptography based on two-photon interferometry.
TLDR
The experimental setup consists of an external source of correlated photon pairs which propagate to two widely separated unbalanced Mach-Zehnder interferometers and can be fully modulated by phase plates in either interferometer.
FREE-SPACE QUANTUM-KEY DISTRIBUTION
Nonproliferation and International Security,Los Alamos, NM 87545(February 1, 2008)A working free-space quantum key distribution (QKD)system has been developed and tested over a 205-m indooroptical
Quantum Key Distribution and String Oblivious Transfer in Noisy Channels
  • D. Mayers
  • Computer Science, Mathematics
    CRYPTO
  • 1996
TLDR
A lemma is proved that extends a security proof given by Yao for a (one bit) QOT protocol to this String-QOT protocol, which implies the unconditional security of the QKD protocol despite the previous proof that unconditionally secure bit commitment schemes are impossible.
...
1
2
3
4
5
...