# Quantum Cryptography

@article{Gisin2001QuantumC, title={Quantum Cryptography}, author={Nicolas Gisin and Gregoire Ribordy and Wolfgang Tittel and Hugo Zbinden}, journal={Reviews of Modern Physics}, year={2001} }

II A beautiful idea 2 A The intuition . . . . . . . . . . . . . . . 2 B Classical cryptography . . . . . . . . . 3 1 Asymmetrical (public-key) cryptosystems . . . . . . . . . . . . . . . 3 2 Symmetrical (secret-key) cryptosystems . . . . . . . . . . . . . . . . . 4 3 The one-time-pad as “classical teleportation” . . . . . . . . . . . . . . 5 C The example of the BB84 protocol . . . 5 1 Principle . . . . . . . . . . . . . . . 5 2 No cloning theorem . . . . . . . . . 6 3 Intercept-resend strategy…

## Figures and Tables from this paper

## 2,887 Citations

A Security Real-time Privacy Amplification Scheme in QKD System

- Computer ScienceJ. Univers. Comput. Sci.
- 2013

This paper proposes the real-time privacy amplification (RTPA) scheme which converts the weak secret string to a uniform key that is fully secret from Eve and implements the ARTPA scheme based on CLIP system, which is connected to the quantum communication system.

Quantum Cryptography

- 2010

Quantum cryptography makes use of the quantum-mechanical behavior of nature for the design and analysis of cryptographic schemes. Optimally (but not always), quantum cryptography allows for the…

Using quantum key distribution for cryptographic purposes: A survey

- Computer Science, PhysicsTheor. Comput. Sci.
- 2014

This survey article reviews and compares the properties of the existing key establishment techniques, QKD being one of them, and studies two generic scenarios related to the practical use of QKKD in cryptographic infrastructures: 1) usingQKD as a key renewal technique for a symmetric cipher over a point-to-point link; 2) using QD in a network containing many users with the objective of offering any- to-any key establishment service.

On the optimality of individual entangling-probe attacks
against BB84 quantum key distribution

- Physics
- 2008

Abstract.Some MIT researchers [Phys. Rev. A
75, 042327 (2007)] have recently claimed that
their implementation of the Slutsky-Brandt attack [Phys. Rev. A
57, 2383 (1998); Phys. Rev. A 71, 042312…

A Novel NTT-Based Authentication Scheme for 10-GHz Quantum Key Distribution Systems

- Computer ScienceIEEE Transactions on Industrial Electronics
- 2016

The experimental results show that the N-Auth algorithm can fully meet the real-time and high-performance demands of modern 10-GHz QKD systems, making it a viable solution for the implementation of industrial-strength unconditionally secure broadband communication solutions.

Cache-Side-Channel Quantification and Mitigation for Quantum Cryptography

- Computer ScienceESORICS
- 2021

This article investigates the role of the software implementation for the security of quantum cryptography against cache side channels and proposes a cost model for the combined mitigation, which allows one to optimize the interaction between privacy amplification and program rewriting for the mitigation.

A Fuzzy Vault Scheme

- Mathematics, Computer ScienceDes. Codes Cryptogr.
- 2006

Fuzzy vaults have potential application to the problem of protecting data in a number of real-world, error-prone environments and also to biometric authentication systems, in which readings are inherently noisy as a result of the refractory nature of image capture and processing.

Quantum Computing: The Risk to Existing Encryption Methods

- Mathematics
- 2015

The basis of modern security relies on encryption methods that are practically impossible, but theoretically possible, to break. The most common is the Rivest-Shamir-Adleman (RSA) cryptosystem, which…

Quantum Cryptography: Opportunities and Challenges

- Computer Science
- 2009

The flaws of quantum cryptographic systems are discussed along with the plans for enhancing current quantum cryptography systems.

Quantum Key Distribution Protocols

- Computer ScienceQuantum Key Distribution
- 2021

The goal of any quantum key distribution protocol is to generate a shared secret key between two distant parties over a public communication channel, and the key generating protocol is provably secure against any possible attack that an eavesdropper can perform.

## References

SHOWING 1-10 OF 308 REFERENCES

The code book: the science of secrecy from ancient egypt to quantum cryptography [Book Review]

- Computer Science, PhysicsIEEE Annals of the History of Computing
- 2002

The Cipher of Mary Queen of Scots: From Shunning Vigenère to the Man in the Iron Mask is a posthumous publication based on a manuscript originally written by Gordon C. Dickinson in 2005 and then edited by David I. Dickinson.

Advances in cryptology--CRYPTO '91 : proceedings

- Mathematics
- 1992

Protocol Design and Analysis.- A Calculus for Access Control in Distributed Systems.- Deriving the Complete Knowledge of Participants in Cryptographic Protocols.- Systematic Design of Two-Party…

Advances in Cryptology: Proceedings Of Crypto 83

- Computer Science
- 1985

Some Public-Key Crypto-Functions as Intractable as Factorization as well as Cryptosystems and Other Hard Problems.

Free-space quantum key distribution in daylight

- Computer Science
- 2000

The theory of quantum cryptography is described, and the most recent results from the experimental free-space system with which it is demonstrated for the first time the feasibility of quantum key generation over a point-to-point outdoor atmospheric path in daylight are described.

Quantum Privacy Amplification and the Security of Quantum Cryptography over Noisy Channels.

- Physics, MedicinePhysical review letters
- 1996

The concept of quantum privacy amplification and a cryptographic scheme incorporating it which is provably secure over a noisy channel is introduced and implemented using technology that is currently being developed.

Modern Cryptology

- Computer ScienceLecture Notes in Computer Science
- 1988

This introductory article presents first of all the two principal categories of cryptographic procedures which are most frequently used: encryption algorithms, which serve to protect the confidentiality of data and signature algorithms which, just like handwritten signatures, guarantee the provenance and the integrity of messages.

Quantum Cryptography on Noisy Channels: Quantum versus Classical Key-Agreement Protocols

- Computer Science, Physics
- 1999

This Letter concerns the dialog between quantum physics and information theory in the context of optimal eavesdropping on a quantum channel and the corresponding secret-key agreement that, in principle, both quantum and classical algorithms provide.

Practical Quantum Cryptography: A Comprehensive Analysis (Part One)

- Physics, Mathematics
- 2000

We perform a comprehensive analysis of practical quantum cryptography (QC) systems implemented in actual physical environments via either free-space or fiber-optic cable quantum channels for…

A method for obtaining digital signatures and public-key cryptosystems

- Computer ScienceCACM
- 1978

An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key, soriers or other secure means are not needed to transmit keys.

Quantum cryptography on multiuser optical fibre networks

- Computer ScienceNature
- 1997

A practical scheme for multi-user quantum cryptography is introduced, and its operation on an optical fibre network is demonstrated, which enables a single controller on the network to establish, and regularly update, a distinct secret key with each network user.