Quantum cryptography with coherent states

@article{Huttner1995QuantumCW,
  title={Quantum cryptography with coherent states},
  author={Bruno Huttner and Nobuyuki Imoto},
  journal={Technical Digest. CLEO/Pacific Rim'95. The Pacific Rim Conference on Lasers and Electro-Optics},
  year={1995},
  pages={15-}
}
  • B. HuttnerN. Imoto
  • Published 21 February 1995
  • Computer Science, Physics
  • Technical Digest. CLEO/Pacific Rim'95. The Pacific Rim Conference on Lasers and Electro-Optics
The safety of a quantum key distribution system relies on the fact that any eavesdropping attempt on the quantum channel creates errors in the transmission. For a given error rate, the amount of information that may have leaked to the eavesdropper depends on both the particular system and the eavesdropping strategy. In this work, we discuss quantum cryptographic protocols based on the transmission of weak coherent states and present a system, based on a symbiosis of two existing systems, for… 

Figures from this paper

Quantum Secure Direct Communication Based on Secret Initial States of EPR Pairs

This paper proposes the protocol of Quantum Secure Direct Communization (QSDC) based on the secret initial Bell states which are shared by two legitimate communicators. Then, we analyze the security

Unconditional security of practical quantum key distribution

This paper is identical to the preprint arXiv:quant-ph/0107017, which was finalized in 2001, therefore, some of the more recent developments, including the question of composability, are not addressed.

Effect of channel imperfection on the secrecy capacity of a quantum cryptographic system

This work presents a semiempirical relation between the fully secure throughput and the loss and noise levels in the channel, and suggests that an implementation of BB84 utilizing commercially available detectors can reach throughputs as high as 104-105 secure bits per second over a practical channel of reasonable quality.

Security of the decoy state method for quantum key distribution

The decoy state method is devoted to, a countermeasure against vulnerabilities caused by the use of coherent states of light for QKD protocols whose security is proved under the assumption of single-photon states.

Defense frontier analysis of quantum cryptographic systems.

The amount of data sacrifice sufficient to defend against individual eavesdropping attacks in both BB84 and B92 protocols is derived and it is concluded that the BB84 protocol may offer better performance characteristics than the B92.

Quantum key distribution against Trojan horse attacks

It is shown that quantum communication may be improved with quantum teleportation and entanglement swapping, which is robustly secure against the most general Trojan horse attacks.

Effect of finite detector efficiencies on the security evaluation of quantum key distribution

Quantum key distribution with the Bennett-Brassard 1984 protocol has been shown to be unconditionally secure even using weak coherent pulses instead of single-photon signals. The distances that can

Quantum Key Distribution with Imperfect Devices

In this Chapter we outline some of the experimental flaws that allow a potential eavesdropper to successfully breach the security of a QKD protocol. We then focus on the solutions to such problems,

Quantum cryptography for secret key generation using frequency-division long-distance interferometry

This work presents a semi-empirical relation between the fully-secure throughput and the loss and noise levels in the channel, and suggests that a particular implementation of BB84, based on the frequency-division multiplexing scheme and utilizing commercially available detectors, can reach throughputs as high as 104 - 105 secure bits per second over a practical channel of reasonable quality.

The security and recent technology of quantum key distribution

The decoy-state method and the entanglement-distribution method can be used to realize the unconditionally secure QKD based on real-life systems with existing technology.
...

References

SHOWING 1-10 OF 31 REFERENCES

Modern Cryptology: A Tutorial

This paper presents a meta-modelling architecture suitable for quantum cryptography that combines public-key and secret-key systems and shows the architecture’s need for future generations of quantum computers.

Europhysics Letters

to discriminate against rotations origina­ ting in other ways. There are detailed variations in the ex­ perimental methods adopted, but the principle is always the same ; the atomic vapour is

Quantization of the electromagnetic field in dielectrics.

  • HuttnerBarnett
  • Physics
    Physical review. A, Atomic, molecular, and optical physics
  • 1992
The dielectric constant of the medium is explicitly derived and is shown to satisfy the Kramers-Kronig relations and the exact eigenoperators for the coupled system are calculated.

Elements of Information Theory

The author examines the role of entropy, inequality, and randomness in the design of codes and the construction of codes in the rapidly changing environment.

Information Theory

Information TheoryPapers read at a Symposium on Information Theory held at the Royal Institution, London, August 29th to September 2nd, 1960. Edited by Colin Cherry. Pp. xi + 476. (London:

Phys

  • Rev. Lett. 68, 3121
  • 1992

Quantum theory: Concepts and methods

and P

    Phys

    • Rev. A 50, 1047
    • 1994

    Quantum cryptography using any two nonorthogonal states.

    • Bennett
    • Physics
      Physical review letters
    • 1992
    It is shown that in principle any two nonorthogonal quantum states suffice, and a practical interferometric realization using low-intensity coherent light pulses is described.