Security of quantum key distribution with imperfect devices

@article{Gottesman2004SecurityOQ,
  title={Security of quantum key distribution with imperfect devices},
  author={Daniel Gottesman and Hoi-Kwong Lo and Norbert L{\"u}tkenhaus and John Preskill},
  journal={International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings.},
  year={2004},
  pages={136-}
}
  • D. Gottesman, H. Lo, J. Preskill
  • Published 11 December 2002
  • Computer Science
  • International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings.
This paper prove the security of the Bennett-Brassard (BB84) quantum key distribution protocol in the case where the source and detector are under the limited control of an adversary. This proof applies when both the source and the detector have small basis-dependent flaws, as is typical in practical implementations of the protocol. The estimation of the key generation rate in some special cases: sources that emit weak coherent states, detectors with basis-dependent efficiency, and misaligned… 
Security of quantum key distribution with bit and basis dependent detector flaws
TLDR
Wesuggest a powerful attack that can be used in systems with detector efficiency mismatch, even if the detector assignments are chosen randomly by Bob, in the presence of bit and basis dependent detector flaws.
Unconditional Security of Quantum Key Distribution with Practical Devices
We present an extension of the first proof for the unconditional security of the BB84 quantum key distribution protocol which was given by Mayers. We remove the constraint that a perfect BB84 quantum
Unconditional Security of Practical Quantum Key Distribution
We present an extension of the first proof for the unconditional security of the BB84 quantum key distribution protocol which was given by Mayers. We remove the constraint that a perfect BB84 quantum
Simple analysis of security of the BB84 quantum key distribution protocol
  • H. Su
  • Computer Science
    Quantum Inf. Process.
  • 2020
TLDR
A simple proof of security of the BB84 protocol is presented, achieved in an information-theoretic way without referring to the formalism of quantum error-correction codes, and it is suggested that it sheds new light on security analysis of quantum key distribution.
Security of quantum key distribution with source and detection imperfections
TLDR
This work derives a security analysis which takes both the source and detection imperfections into account, and presents an important step toward the practical security of QKD wit realistic devices.
Finite-key analysis for quantum key distribution with decoy states
We analyze the security of finite-resource quantum key distribution with decoy states, and present the security bound for the practical implementations by introducing the deviations of the
Experimental quantum-key distribution with an untrusted source.
TLDR
This work proposes a practical method, with only a beam splitter and a photodetector, to monitor the photon statistics of a quantum-key-distribution source, and shows that the method is highly practical.
Source monitor in quantum key distribution
  • Xiang Peng, Hong Guo
  • Computer Science
    2011 XXXth URSI General Assembly and Scientific Symposium
  • 2011
TLDR
This paper analyzes passive source-monitor scheme, and shows that this scheme can be well implemented in practice.
Attacks on Fixed Apparatus Quantum Key Distribution Schemes
TLDR
It is shown that, although theoretical quantum key distribution (QKD) is proven secure, such implementations are totally insecure against a strong eavesdropper that has a one-time access to the receiver's equipment.
Attacks on Fixed Apparatus Quantum Key Distribution Schemes
TLDR
The "fixed-apparatus attack" causes a potential risk to the usefulness of several recent quantum key distribution implementations, and is shown to be totally insecure against a strong eavesdropper that has one-time access to the receiver's equipment.
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 37 REFERENCES
Security against individual attacks for realistic quantum key distribution
TLDR
A formula for the secure bit rate per time slot of an experimental setup is obtained which can be used to optimize the performance of existing schemes for the considered scenario.
A Proof of the Security of Quantum Key Distribution
We prove the security of theoretical quantum key distribution against the most general attacks which can be performed on the channel, by an eavesdropper who has unlimited computation abilities, and
ESTIMATES FOR PRACTICAL QUANTUM CRYPTOGRAPHY
TLDR
A protocol for quantum cryptography which is secure against attacks on individual signals based on the Bennett-Brassard protocol of 1984, which gives the probability of a successful key generation and the probability for an eavesdropper's knowledge to be below a specified maximal value.
Secure quantum key distribution with an uncharacterized source.
We prove the security of the Bennett-Brassard (BB84) quantum key distribution protocol for an arbitrary source whose averaged states are basis independent, a condition that is automatically satisfied
Security Aspects of Practical Quantum Cryptography
TLDR
This work provides a thorough investigation of security issues for practical quantum key distribution, taking into account channel losses, and a realistic detection process.
Quantum cryptography with imperfect apparatus
  • D. Mayers, A. Yao
  • Mathematics
    Proceedings 39th Annual Symposium on Foundations of Computer Science (Cat. No.98CB36280)
  • 1998
TLDR
This paper proposes and gives a concrete design for a new concept, self-checking source, which requires the manufacturer of the photon source to provide certain tests; these tests are designed such that, if passed, the source is guaranteed to be adequate for the security of the quantum key distribution protocol, even though the testing devices may not be built to the original specification.
Secure quantum key distribution using squeezed states
TLDR
This proof employs quantum error-correcting codes that encode a finite-dimensional quantum system in the infinite-dimensional Hilbert space of an oscillator, and protect against errors that shift the canonical variables p and q.
Unconditional security in quantum cryptography
TLDR
Basic techniques to prove the unconditional security of quantum crypto graphy are described and a practical variation on the protocol in which the channel is noisy and photos may be lost during the transmission is considered.
Simple proof of security of the BB84 quantum key distribution protocol
We prove that the 1984 protocol of Bennett and Brassard (BB84) for quantum key distribution is secure. We first give a key distribution protocol based on entanglement purification, which can be
Unconditional security of quantum key distribution over arbitrarily long distances
  • Lo, Châu
  • Computer Science
    Science
  • 1999
TLDR
The problem is solved by showing that, given fault-tolerant quantum computers, quantum key distribution over an arbitrarily long distance of a realistic noisy channel can be made unconditionally secure.
...
1
2
3
4
...