Security aspects of practical quantum cryptography

@article{Brassard2000SecurityAO,
  title={Security aspects of practical quantum cryptography},
  author={Gilles Brassard and Norbert L{\"u}tkenhaus and Tal Mor and Barry C. Sanders},
  journal={Conference Digest. 2000 International Quantum Electronics Conference (Cat. No.00TH8504)},
  year={2000},
  pages={1 pp.-}
}
  • G. BrassardN. Lütkenhaus B. Sanders
  • Published 12 November 1999
  • Computer Science
  • Conference Digest. 2000 International Quantum Electronics Conference (Cat. No.00TH8504)
Summary form only given. Quantum information theory suggests the possibility of accomplishing tasks that are beyond the capability of classical computer science, such as information-secure cryptographic key distribution. The lack of security proofs for standard (secret- and public-) key distribution schemes, and the insecurity of the most widely used classical schemes (such as RSA and PGP) against "quantum attacks" emphasises the need for information-secure key distribution. We provide a… 

Introduction to Quantum Key Distribution

In this entry the process and specific characteristics of QKD are discussed, including the meaning of the “absolute security” character that is usually ascribed toQKD, its limitations and practical implementation.

Fully device independent quantum key distribution

This work rigorously proves the device-independent security of an entanglement-based protocol building on Ekert's original proposal for quantum key distribution and builds on techniques from the classical theory of pseudo-randomness to achieve a new quantitative understanding of the non-local nature of quantum correlations.

A survey of quantum key distribution protocols

This paper surveys the quantum key distribution protocols which exist in literature and explores the attacks to which they are vulnerable and highlights the main implementation bottlenecks related with each implementation and the solutions proposed thereof.

Implementation vulnerabilities in general quantum cryptography

This work surveys quantum digital signatures, quantum secret sharing, source-independent quantum random number generation, quantum secure direct communication, and blind quantum computing and proposes how the eavesdropper could in principle exploit the loopholes to violate assumptions in these protocols, breaking their security properties.

A Modified Quantum Key Distribution Without Public Announcement Bases Against Photon-Number-Splitting Attack

Drawing ideas from cipher block chaining, a possible modified protocol is put forward, which is secure against the presented attacks at zero error, which can be overcame by performing classical privacy amplification.

Quantum key distribution with quantum walks

This paper introduces a secure quantum key distribution protocol equipped with verification procedures against full man-in-the-middle attacks, and presents a one-way protocol and proves its security.

Information Security and Quantum Mechanics: Security of Quantum Protocols

It is found that unitary bases are central to both encryption of quantum information, as well as the generation of states used in generalized quantum key distribution (which are called mutually unbiased bases).

Practical quantum key distribution with geometrically uniform states

The protocol extends the ideas used in SARG04 to the limit where the core quantum communication is secure against unambiguous state discrimination and provides some level of inherent resistance to photon number splitting attacks.

A Proof of the Security of Quantum Key Distribution

We prove the security of theoretical quantum key distribution against the most general attacks which can be performed on the channel, by an eavesdropper who has unlimited computation abilities, and

The security of practical quantum key distribution

Essential theoretical tools that have been developed to assess the security of the main experimental platforms are presented (discrete- variable, continuous-variable, and distributed-phase-reference protocols).
...

References

SHOWING 1-10 OF 48 REFERENCES

Security of Quantum Key Distribution against All Collective Attacks

This work proves security against a very important class of attacks called collective attacks (under a compatible noise model) which use quantum memories and gates, and which are directed against the final key.

A Proof of the Security of Quantum Key Distribution

We prove the security of theoretical quantum key distribution against the most general attacks which can be performed on the channel, by an eavesdropper who has unlimited computation abilities, and

Unconditional security in quantum cryptography

Basic techniques to prove the unconditional security of quantum crypto graphy are described and a practical variation on the protocol in which the channel is noisy and photos may be lost during the transmission is considered.

Security against individual attacks for realistic quantum key distribution

A formula for the secure bit rate per time slot of an experimental setup is obtained which can be used to optimize the performance of existing schemes for the considered scenario.

Security against individual attacks for realistic quantum key distribution

A formula for the secure bit rate per time slot of an experimental setup is obtained which can be used to optimize the performance of existing schemes for the considered scenario.

submitted toacta physica slovaca SECURITY OF QUANTUM CRYPTOGRAPHY WITH REALISTIC SOURCES

The effect the key rate can be obtained in a practical setting within the scenario of security against individual attacks by an eavesdropper is given.

Quantum memory in quantum cryptography

  • T. Mor
  • Computer Science, Physics
  • 1999
This work defines strong attacks of this type, and shows security against them, suggesting that quantum cryptography is secure, and suggests a new type of quantum key distribution scheme where quantum memories are used instead of quantum channels.

Quantum Key Distribution and String Oblivious Transfer in Noisy Channels

  • D. Mayers
  • Computer Science, Mathematics
    CRYPTO
  • 1996
A lemma is proved that extends a security proof given by Yao for a (one bit) QOT protocol to this String-QOT protocol, which implies the unconditional security of the QKD protocol despite the previous proof that unconditionally secure bit commitment schemes are impossible.

Quantum cryptography using any two nonorthogonal states.

  • Bennett
  • Physics
    Physical review letters
  • 1992
It is shown that in principle any two nonorthogonal quantum states suffice, and a practical interferometric realization using low-intensity coherent light pulses is described.

FREE-SPACE QUANTUM-KEY DISTRIBUTION

Nonproliferation and International Security,Los Alamos, NM 87545(February 1, 2008)A working free-space quantum key distribution (QKD)system has been developed and tested over a 205-m indooroptical