# Quantum key distribution with realistic states: photon-number statistics in the photon-number splitting attack

@article{Lutkenhaus2002QuantumKD, title={Quantum key distribution with realistic states: photon-number statistics in the photon-number splitting attack}, author={Norbert Lutkenhaus and M. O. Jahma}, journal={New Journal of Physics}, year={2002}, volume={4}, pages={44-44} }

Quantum key distribution can be performed with practical signal sources such as weak coherent pulses. One example of such a scheme is the Bennett-Brassard protocol that can be implemented via polarization of the signals, or equivalent signals. It turns out that the most powerful tool at the disposition of an eavesdropper is the photon-number splitting attack. We show that this attack can be extended in the relevant parameter regime so as to preserve the Poissonian photon number distribution of…

## 204 Citations

Decoy State Quantum Key Distribution with Odd Coherent State

- Physics
- 2008

We propose a decoy state quantum key distribution scheme with odd coherent state which follows sub-Poissonian distributed photon count and has low probability of the multi-photon event and vacuum…

Fast quantum key distribution with decoy number states

- Physics
- 2008

We investigate the use of photon number states to identify eavesdropping attacks on quantum key distribution (QKD) schemes. The technique is based on the fact that different photon numbers traverse a…

Thwarting the photon number splitting attack with entanglement enhanced BB84 quantum key distribution

- PhysicsDefense + Commercial Sensing
- 2012

We develop an improvement to the weak laser pulse BB84 scheme for quantum key distribution, which utilizes entanglement to increase the security of the scheme and enhance its resilience to the…

Thwarting the Photon Number Splitting Attack with Entanglement Enhanced BB84 Quantum Key Distribution

- Physics
- 2012

We develop an improvement to the weak laser pulse BB84 scheme for quantum key distribution, which utilizes entanglement to improve the security of the scheme and enhance its resilience to the…

An enhanced proposal on decoy-state measurement device-independent quantum key distribution

- PhysicsQuantum Inf. Process.
- 2016

By employing pulses involving three-intensity, a scheme for the measurement device-independent quantum key distribution with heralded single-photon sources is proposed that can approach very closely the asymptotic case of using an infinite number of decoy-states and exhibits excellent behavior in both the secure transmission distance and the final key generation rate.

High Efficient Quantum Key Distribution by Random Using Classified Signal Coherent States

- Physics
- 2006

The decoy-state method is a useful method in resisting the attacks on quantum key distribution. However, how to choose the intensities of decoy states and the ratio of the decoy states and the signal…

Photon-number-resolving decoy-state quantum key distribution

- Physics, Computer Science
- 2006

It is shown that Eve's coherent multiphoton pulse (CMP) attack is more efficient than a symmetric individual attack when the quantum bit error rate is small, so that the CMP attack should be considered to ensure the security of the final key.

Effect of finite detector efficiencies on the security evaluation of quantum key distribution

- Physics
- 2004

Quantum key distribution with the Bennett-Brassard 1984 protocol has been shown to be unconditionally secure even using weak coherent pulses instead of single-photon signals. The distances that can…

Security of quantum key distribution with detection-efficiency mismatch in the single-photon case: Tight bounds

- Computer SciencePhysical Review A
- 2019

A method based on the analytical minimization of the relative entropy of coherence, which can be used in other problems in quantum key distribution, is proposed and an adaptation of the decoy state method to proof the security in the case of weak coherent pulses on the source side is proposed.

An improved scheme on decoy-state method for measurement-device-independent quantum key distribution

- PhysicsScientific reports
- 2015

This work proposes a practically realizable scheme on quantum key distribution which approaches very closely the ideal asymptotic case of an infinite number of decoy-states and demonstrates the advantages in secure transmission distance and the final key generation rate.

## References

SHOWING 1-10 OF 25 REFERENCES

Limitations on practical quantum cryptography

- Physics, Computer SciencePhysical review letters
- 2000

It is shown that parametric down-conversion offers enhanced performance compared to its weak coherent pulse counterpart and existing experimental schemes (based on weak pulses) currently do not offer unconditional security for the reported distances and signal strength.

Quantum cryptography with coherent states.

- Computer Science, PhysicsPhysical review. A, Atomic, molecular, and optical physics
- 1995

This work discusses quantum cryptographic protocols based on the transmission of weak coherent states and presents a system, based on a symbiosis of two existing systems, for which the information available to the eavesdropper is significantly reduced and is therefore safer than the two previous ones.

Conditional beam-splitting attack on quantum key distribution

- Physics
- 2001

We present a different attack on quantum key distribution based on the idea of adaptive absorption [J. Calsamiglia et al., Phys. Rev. A (64, 043814 (2001)]. The conditional beam-splitting attack is…

Security against individual attacks for realistic quantum key distribution

- Computer Science
- 2000

A formula for the secure bit rate per time slot of an experimental setup is obtained which can be used to optimize the performance of existing schemes for the considered scenario.

Towards practical quantum cryptography

- Physics, Computer Science
- 1999

Performance tests of a new design based on polarization encoding of attenuated, coherent light pulses show that this compact setup can achieve an effective key-bit rate in the kHz range with low alignment requirements and thus offers the tools for fast and user-friendly quantum key exchange.

Optimal Eavesdropping in Quantum Cryptography with Six States

- Computer Science
- 1998

A generalization of the quantum cryptographic protocol by Bennett and Brassard is discussed, using three conjugate bases, i.e. six states, and it is shown that this scheme is safer against eavesdropping on single qubits than the one based on two conjugates.

Quantum key distribution over distances as long as 30 km.

- Computer Science, MathematicsOptics letters
- 1995

Low error rates were obtained for the quantum transmissions, and error-free secret keys were distilled from the raw data by use of secure error-correction and privacy-amplification protocols.

Experimental investigation of the performance limits for first telecommunications-window quantum cryptography systems

- Physics
- 1998

Quantum cryptography offers the unique possibility of certifiably secure key distribution between remote locations, practical systems require efficient, low noise, single photon avalanche photodiodes…

Conjugate coding

- PhysicsSIGA
- 1983

It is shown that in compensation for this "quantum noise", quantum mechanics allows us novel forms of coding without analogue in communication channels adequately described by classical physics.

Experiments on long wavelength (1550 nm) "plug and play" quantum cryptography systems.

- Physics, Computer Science
- 1999

An interferometric quantum cryptographic system at 1550nm wavelength using gated InGaAs Avalanche Photo Diodes as single-photon receivers is demonstrated for a transmission distance up to 40 km.