Quantum cryptography with coherent states
@article{Huttner1995QuantumCW, title={Quantum cryptography with coherent states}, author={Bruno Huttner and Nobuyuki Imoto}, journal={Technical Digest. CLEO/Pacific Rim'95. The Pacific Rim Conference on Lasers and Electro-Optics}, year={1995}, pages={15-} }
The safety of a quantum key distribution system relies on the fact that any eavesdropping attempt on the quantum channel creates errors in the transmission. For a given error rate, the amount of information that may have leaked to the eavesdropper depends on both the particular system and the eavesdropping strategy. In this work, we discuss quantum cryptographic protocols based on the transmission of weak coherent states and present a system, based on a symbiosis of two existing systems, for…
Figures from this paper
459 Citations
Quantum Secure Direct Communication Based on Secret Initial States of EPR Pairs
- Computer Science2011 Third International Conference on Multimedia Information Networking and Security
- 2011
This paper proposes the protocol of Quantum Secure Direct Communization (QSDC) based on the secret initial Bell states which are shared by two legitimate communicators. Then, we analyze the security…
Unconditional security of practical quantum key distribution
- Computer Science
- 2007
This paper is identical to the preprint arXiv:quant-ph/0107017, which was finalized in 2001, therefore, some of the more recent developments, including the question of composability, are not addressed.
Effect of channel imperfection on the secrecy capacity of a quantum cryptographic system
- Computer Science
- 1997
This work presents a semiempirical relation between the fully secure throughput and the loss and noise levels in the channel, and suggests that an implementation of BB84 utilizing commercially available detectors can reach throughputs as high as 104-105 secure bits per second over a practical channel of reasonable quality.
Security of the decoy state method for quantum key distribution
- Computer Science, MathematicsPhysics-Uspekhi
- 2020
The decoy state method is devoted to, a countermeasure against vulnerabilities caused by the use of coherent states of light for QKD protocols whose security is proved under the assumption of single-photon states.
Defense frontier analysis of quantum cryptographic systems.
- Computer ScienceApplied optics
- 1998
The amount of data sacrifice sufficient to defend against individual eavesdropping attacks in both BB84 and B92 protocols is derived and it is concluded that the BB84 protocol may offer better performance characteristics than the B92.
Quantum key distribution against Trojan horse attacks
- Computer Science, Physics
- 2007
It is shown that quantum communication may be improved with quantum teleportation and entanglement swapping, which is robustly secure against the most general Trojan horse attacks.
Effect of finite detector efficiencies on the security evaluation of quantum key distribution
- Physics
- 2004
Quantum key distribution with the Bennett-Brassard 1984 protocol has been shown to be unconditionally secure even using weak coherent pulses instead of single-photon signals. The distances that can…
Quantum Key Distribution with Imperfect Devices
- Physics
- 2021
In this Chapter we outline some of the experimental flaws that allow a potential eavesdropper to successfully breach the security of a QKD protocol. We then focus on the solutions to such problems,…
Quantum cryptography for secret key generation using frequency-division long-distance interferometry
- Computer Science, MathematicsPhotonics West
- 1996
This work presents a semi-empirical relation between the fully-secure throughput and the loss and noise levels in the channel, and suggests that a particular implementation of BB84, based on the frequency-division multiplexing scheme and utilizing commercially available detectors, can reach throughputs as high as 104 - 105 secure bits per second over a practical channel of reasonable quality.
The security and recent technology of quantum key distribution
- Computer Science, Physics
- 2006
The decoy-state method and the entanglement-distribution method can be used to realize the unconditionally secure QKD based on real-life systems with existing technology.
References
SHOWING 1-10 OF 31 REFERENCES
Modern Cryptology: A Tutorial
- Computer Science, Mathematics
- 1989
This paper presents a meta-modelling architecture suitable for quantum cryptography that combines public-key and secret-key systems and shows the architecture’s need for future generations of quantum computers.
Europhysics Letters
- Physics
- 1997
to discriminate against rotations origina ting in other ways. There are detailed variations in the ex perimental methods adopted, but the principle is always the same ; the atomic vapour is…
Quantization of the electromagnetic field in dielectrics.
- PhysicsPhysical review. A, Atomic, molecular, and optical physics
- 1992
The dielectric constant of the medium is explicitly derived and is shown to satisfy the Kramers-Kronig relations and the exact eigenoperators for the coupled system are calculated.
Elements of Information Theory
- Computer Science
- 1991
The author examines the role of entropy, inequality, and randomness in the design of codes and the construction of codes in the rapidly changing environment.
Information Theory
- Political ScienceNature
- 1962
Information TheoryPapers read at a Symposium on Information Theory held at the Royal Institution, London, August 29th to September 2nd, 1960. Edited by Colin Cherry. Pp. xi + 476. (London:…
Phys
- Rev. Lett. 68, 3121
- 1992
and P
Phys
- Rev. A 50, 1047
- 1994
Quantum cryptography using any two nonorthogonal states.
- PhysicsPhysical review letters
- 1992
It is shown that in principle any two nonorthogonal quantum states suffice, and a practical interferometric realization using low-intensity coherent light pulses is described.