Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations.

@article{Scarani2004QuantumCP,
  title={Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations.},
  author={Valerio Scarani and Antonio Ac{\'i}n and Gregoire Ribordy and Nicolas Gisin},
  journal={Physical review letters},
  year={2004},
  volume={92 5},
  pages={
          057901
        }
}
We introduce a new class of quantum key distribution protocols, tailored to be robust against photon number splitting (PNS) attacks. We study one of these protocols, which differs from the original protocol by Bennett and Brassard (BB84) only in the classical sifting procedure. This protocol is provably better than BB84 against PNS attacks at zero error. 
A Modified Quantum Key Distribution Without Public Announcement Bases Against Photon-Number-Splitting Attack
The security of quantum cryptography without public announcement bases in photon-number-splitting attack is discussed. Based on unambiguous state discrimination, we propose two attack strategies andExpand
New protocol for quantum public key cryptography
  • A. Parakh
  • Physics, Computer Science
  • 2015 IEEE International Conference on Advanced Networks and Telecommuncations Systems (ANTS)
  • 2015
TLDR
A quantum public key cryptographic protocol that allow Bob to send any arbitrary qubit state to Alice, securely, using quantum entanglement and does not discard any qubits during the transfer process is presented. Expand
Principles of quantum cryptography/quantum key distribution (QKD) using attenuated light pulses
Abstract: Based on the very foundations of quantum physics, quantum information methods can enhance conventional communication methods and enable completely new types of information processing.Expand
On geometrically uniform states in quantum cryptography
A family of quantum key distribution protocols based on geometrically uniform states of laser radiation has been proposed. Their cryptographic strength against a unitary attack, aExpand
Security proof of Improved-SARG04 protocol using the same four qubit states
TLDR
This protocol differs from BB84 and SARG04 protocol in the sifting process and provably outperforms those protocols against Photon Number Splitting attack at zero error, with secure transmission distance of 125 km of SSMF. Expand
Megabits secure key rate quantum key distribution
Imperfect practical conditions limit communication speed of Quantum cryptography. Here we implement differential phase shift quantum key distribution with up-conversion assisted hybrid photonExpand
Megabits secure key rate quantum key distribution
Quantum cryptography can provide unconditional secure communication between two authorized parties based on the basic principles of quantum mechanics. However, imperfect practical conditions limitExpand
Study on Quantum Key Distribution
TLDR
QKD is a research hotspot of international academia in recent years and some protocols are introduced: BB84 protocol, E91 protocol, SARG04 protocol. Expand
Free space relativistic quantum cryptography with faint laser pulses
A new protocol for quantum key distribution through empty space is proposed. Apart from the quantum mechanical restrictions on distinguishability of non-orthogonal states, the protocol employsExpand
Quantum key distribution technologies
  • K. Inoue
  • Computer Science
  • IEEE Journal of Selected Topics in Quantum Electronics
  • 2006
TLDR
This paper describes QC technologies, introduces a typical and widely used QC protocol BB84 and then describes a recently proposed scheme called the differential-phase-shift protocol. Expand
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 24 REFERENCES
Coherent-pulse implementations of quantum cryptography protocols resistant to photon-number-splitting attacks
We propose a class of quantum cryptography protocols that are robust against photon-number-splitting attacks (PNS) in a weak coherent-pulse implementation. We give a quite exhaustive analysis ofExpand
Limitations on practical quantum cryptography
TLDR
It is shown that parametric down-conversion offers enhanced performance compared to its weak coherent pulse counterpart and existing experimental schemes (based on weak pulses) currently do not offer unconditional security for the reported distances and signal strength. Expand
Security against individual attacks for realistic quantum key distribution
The first complete protocol for quantum key distribution (qkd) has been introduced by Bennett and Brassard in 1984 [1] following earlier ideas by Wiesner [2]. Since then, this protocol (BB84 forExpand
Rev
  • Mod. Phys. 74, 145
  • 2002
Phys
  • Rev. Lett. 91, 057901
  • 2003
Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulses implementations
  • Phys . Rev . A
  • 2002
Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulses implementations . quant-ph
  • Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulses implementations . quant-ph
  • 2002
Rev. Mod. Phys
  • Rev. Mod. Phys
  • 2002
Zbinden. Quantum cryptography. Rev. Mod. Phys
  • Zbinden. Quantum cryptography. Rev. Mod. Phys
  • 2002
J. Mod. Opt
  • J. Mod. Opt
  • 2001
...
1
2
3
...