# Security aspects of practical quantum cryptography

@article{Brassard2000SecurityAO, title={Security aspects of practical quantum cryptography}, author={Gilles Brassard and Norbert L{\"u}tkenhaus and Tal Mor and Barry C. Sanders}, journal={Conference Digest. 2000 International Quantum Electronics Conference (Cat. No.00TH8504)}, year={2000}, pages={1 pp.-} }

Summary form only given. Quantum information theory suggests the possibility of accomplishing tasks that are beyond the capability of classical computer science, such as information-secure cryptographic key distribution. The lack of security proofs for standard (secret- and public-) key distribution schemes, and the insecurity of the most widely used classical schemes (such as RSA and PGP) against "quantum attacks" emphasises the need for information-secure key distribution. We provide a…

## 544 Citations

### Introduction to Quantum Key Distribution

- Computer Science, Mathematics
- 2017

In this entry the process and specific characteristics of QKD are discussed, including the meaning of the “absolute security” character that is usually ascribed toQKD, its limitations and practical implementation.

### Fully device independent quantum key distribution

- Computer ScienceCommun. ACM
- 2019

This work rigorously proves the device-independent security of an entanglement-based protocol building on Ekert's original proposal for quantum key distribution and builds on techniques from the classical theory of pseudo-randomness to achieve a new quantitative understanding of the non-local nature of quantum correlations.

### A survey of quantum key distribution protocols

- Computer Science, MathematicsFIT
- 2009

This paper surveys the quantum key distribution protocols which exist in literature and explores the attacks to which they are vulnerable and highlights the main implementation bottlenecks related with each implementation and the solutions proposed thereof.

### Implementation vulnerabilities in general quantum cryptography

- Computer Science, PhysicsNew Journal of Physics
- 2018

This work surveys quantum digital signatures, quantum secret sharing, source-independent quantum random number generation, quantum secure direct communication, and blind quantum computing and proposes how the eavesdropper could in principle exploit the loopholes to violate assumptions in these protocols, breaking their security properties.

### A Modified Quantum Key Distribution Without Public Announcement Bases Against Photon-Number-Splitting Attack

- Computer Science
- 2012

Drawing ideas from cipher block chaining, a possible modified protocol is put forward, which is secure against the presented attacks at zero error, which can be overcame by performing classical privacy amplification.

### Quantum key distribution with quantum walks

- Computer Science, MathematicsQuantum Inf. Process.
- 2018

This paper introduces a secure quantum key distribution protocol equipped with verification procedures against full man-in-the-middle attacks, and presents a one-way protocol and proves its security.

### Information Security and Quantum Mechanics: Security of Quantum Protocols

- Computer Science
- 2002

It is found that unitary bases are central to both encryption of quantum information, as well as the generation of states used in generalized quantum key distribution (which are called mutually unbiased bases).

### Practical quantum key distribution with geometrically uniform states

- Computer SciencePhysical Review A
- 2019

The protocol extends the ideas used in SARG04 to the limit where the core quantum communication is secure against unambiguous state discrimination and provides some level of inherent resistance to photon number splitting attacks.

### A Proof of the Security of Quantum Key Distribution

- Computer Science, MathematicsSTOC '00
- 2000

We prove the security of theoretical quantum key distribution against the most general attacks which can be performed on the channel, by an eavesdropper who has unlimited computation abilities, and…

### The security of practical quantum key distribution

- Computer Science
- 2009

Essential theoretical tools that have been developed to assess the security of the main experimental platforms are presented (discrete- variable, continuous-variable, and distributed-phase-reference protocols).

## References

SHOWING 1-10 OF 48 REFERENCES

### Security of Quantum Key Distribution against All Collective Attacks

- Computer Science, MathematicsAlgorithmica
- 2002

This work proves security against a very important class of attacks called collective attacks (under a compatible noise model) which use quantum memories and gates, and which are directed against the final key.

### A Proof of the Security of Quantum Key Distribution

- Computer Science, MathematicsSTOC '00
- 2000

We prove the security of theoretical quantum key distribution against the most general attacks which can be performed on the channel, by an eavesdropper who has unlimited computation abilities, and…

### Unconditional security in quantum cryptography

- Computer ScienceJACM
- 2001

Basic techniques to prove the unconditional security of quantum crypto graphy are described and a practical variation on the protocol in which the channel is noisy and photos may be lost during the transmission is considered.

### Security against individual attacks for realistic quantum key distribution

- Computer Science
- 1999

A formula for the secure bit rate per time slot of an experimental setup is obtained which can be used to optimize the performance of existing schemes for the considered scenario.

### Security against individual attacks for realistic quantum key distribution

- Computer Science
- 2000

A formula for the secure bit rate per time slot of an experimental setup is obtained which can be used to optimize the performance of existing schemes for the considered scenario.

### submitted toacta physica slovaca SECURITY OF QUANTUM CRYPTOGRAPHY WITH REALISTIC SOURCES

- Computer Science
- 1999

The effect the key rate can be obtained in a practical setting within the scenario of security against individual attacks by an eavesdropper is given.

### Quantum memory in quantum cryptography

- Computer Science, Physics
- 1999

This work defines strong attacks of this type, and shows security against them, suggesting that quantum cryptography is secure, and suggests a new type of quantum key distribution scheme where quantum memories are used instead of quantum channels.

### Quantum Key Distribution and String Oblivious Transfer in Noisy Channels

- Computer Science, MathematicsCRYPTO
- 1996

A lemma is proved that extends a security proof given by Yao for a (one bit) QOT protocol to this String-QOT protocol, which implies the unconditional security of the QKD protocol despite the previous proof that unconditionally secure bit commitment schemes are impossible.

### Quantum cryptography using any two nonorthogonal states.

- PhysicsPhysical review letters
- 1992

It is shown that in principle any two nonorthogonal quantum states suffice, and a practical interferometric realization using low-intensity coherent light pulses is described.

### FREE-SPACE QUANTUM-KEY DISTRIBUTION

- Physics
- 1998

Nonproliferation and International Security,Los Alamos, NM 87545(February 1, 2008)A working free-space quantum key distribution (QKD)system has been developed and tested over a 205-m indooroptical…