• Corpus ID: 118227839

Quantum cryptography in real-life applications: assumptions and security

  title={Quantum cryptography in real-life applications: assumptions and security},
  author={Yi Zhao},
  • Yi Zhao
  • Published 2009
  • Computer Science, Mathematics
Quantum cryptography, or quantum key distribution (QKD), provides a means of unconditionally secure communication. The security is in principle based on the fundamental laws of physics. Security proofs show that if quantum cryptography is appropriately implemented, even the most powerful eavesdropper cannot decrypt the message from a cipher. The implementations of quantum crypto-systems in real life may not fully comply with the assumptions made in the security proofs. Such discrepancy between… 
The Implementation of the Frequency-Time Encoded Decoy-State Protocol with the Slow-Light Effect for Quantum Memories
A new technique has been introduced, which allows Bob to detect the frequencies of few-photon pulses in the single photon regime based on the slow-light effect, which can be achieved by using special materials, where the speed of light is reduced by 4 to 5 orders of magnitude compared to its speed in vacuum.
Leveraging the power of quantum computing for breaking RSA encryption
A novel approach is provided to highlight the importance of developing Post-Quantum cryptography techniques for providing a secure channel of communication.
Security of plug-and-play QKD arrangements with finite resources
  • P. Salas
  • Computer Science, Mathematics
    Quantum Inf. Comput.
  • 2013
The security of a passive plug-and-play QKD arrangement in the case of finite (resources) key lengths is analysed and two main strategies are addressed: with and without two-decoy-states including the optimization of signal to decoy relationship.


Practical post-processing for quantum-key-distribution experiments
Quantum Privacy Amplification and the Security of Quantum Cryptography over Noisy Channels.
The concept of quantum privacy amplification and a cryptographic scheme incorporating it which is provably secure over a noisy channel is introduced and implemented using technology that is currently being developed.
Is Quantum Bit Commitment Really Possible?
At the heart of such optimism has been the widespread belief that unconditionally secure quantum bit commitment (QBC) schemes exist, which is put into very serious doubt by showing.
No signaling and quantum key distribution.
A key distribution scheme provably secure against general attacks by a postquantum eavesdropper limited only by the impossibility of superluminal signaling is described, which stems from violation of a Bell inequality.
Unconditional security in quantum cryptography
Basic techniques to prove the unconditional security of quantum crypto graphy are described and a practical variation on the protocol in which the channel is noisy and photos may be lost during the transmission is considered.
Security proof of differential phase shift quantum key distribution in the noiseless case
This work proves differential phase shift quantum key distribution security against collective attacks with a weak coherent light source in the noiseless case and shows that the lower bound of the secret key generation rate per pulse is linearly proportional to the channel transmission probability if Bob's detection counts obey the binomial distribution.
Quantum cryptography on multiuser optical fibre networks
A practical scheme for multi-user quantum cryptography is introduced, and its operation on an optical fibre network is demonstrated, which enables a single controller on the network to establish, and regularly update, a distinct secret key with each network user.
Decoy state quantum key distribution.
The method is to use decoy states to detect eavesdropping attacks and has the best of both worlds--enjoying unconditional security guaranteed by the fundamental laws of physics and yet dramatically surpassing some of the best experimental performances reported in the literature.
Unconditional security of practical quantum key distribution
This paper is identical to the preprint arXiv:quant-ph/0107017, which was finalized in 2001, therefore, some of the more recent developments, including the question of composability, are not addressed.
The Universal Composable Security of Quantum Key Distribution
A universal composability theorem for the quantum setting is derived that shows that keys generated by repeated runs of QKD degrade slowly and can indeed be safely used, a property ofQKD that is hitherto unproven.