# Security of quantum key distribution with imperfect devices

@article{Gottesman2004SecurityOQ, title={Security of quantum key distribution with imperfect devices}, author={Daniel Gottesman and Hoi-Kwong Lo and Norbert L{\"u}tkenhaus and John Preskill}, journal={International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings.}, year={2004}, pages={136-} }

This paper prove the security of the Bennett-Brassard (BB84) quantum key distribution protocol in the case where the source and detector are under the limited control of an adversary. This proof applies when both the source and the detector have small basis-dependent flaws, as is typical in practical implementations of the protocol. The estimation of the key generation rate in some special cases: sources that emit weak coherent states, detectors with basis-dependent efficiency, and misaligned…

## 694 Citations

Security of quantum key distribution with bit and basis dependent detector flaws

- Computer ScienceQuantum Inf. Comput.
- 2010

Wesuggest a powerful attack that can be used in systems with detector efficiency mismatch, even if the detector assignments are chosen randomly by Bob, in the presence of bit and basis dependent detector flaws.

Unconditional Security of Quantum Key Distribution with Practical Devices

- Computer Science
- 2006

We present an extension of the first proof for the unconditional security of the BB84 quantum key distribution protocol which was given by Mayers. We remove the constraint that a perfect BB84 quantum…

Unconditional Security of Practical Quantum Key Distribution

- Computer Science
- 2004

We present an extension of the first proof for the unconditional security of the BB84 quantum key distribution protocol which was given by Mayers. We remove the constraint that a perfect BB84 quantum…

Simple analysis of security of the BB84 quantum key distribution protocol

- Computer ScienceQuantum Inf. Process.
- 2020

A simple proof of security of the BB84 protocol is presented, achieved in an information-theoretic way without referring to the formalism of quantum error-correction codes, and it is suggested that it sheds new light on security analysis of quantum key distribution.

Security of quantum key distribution with source and detection imperfections

- Computer Science
- 2021

This work derives a security analysis which takes both the source and detection imperfections into account, and presents an important step toward the practical security of QKD wit realistic devices.

Finite-key analysis for quantum key distribution with decoy states

- Computer Science, PhysicsQuantum Inf. Comput.
- 2011

We analyze the security of finite-resource quantum key distribution with decoy states, and present the security bound for the practical implementations by introducing the deviations of the…

Experimental quantum-key distribution with an untrusted source.

- PhysicsOptics letters
- 2008

This work proposes a practical method, with only a beam splitter and a photodetector, to monitor the photon statistics of a quantum-key-distribution source, and shows that the method is highly practical.

Source monitor in quantum key distribution

- Computer Science2011 XXXth URSI General Assembly and Scientific Symposium
- 2011

This paper analyzes passive source-monitor scheme, and shows that this scheme can be well implemented in practice.

Attacks on Fixed Apparatus Quantum Key Distribution Schemes

- Physics, Computer ScienceTPNC
- 2012

It is shown that, although theoretical quantum key distribution (QKD) is proven secure, such implementations are totally insecure against a strong eavesdropper that has a one-time access to the receiver's equipment.

Attacks on Fixed Apparatus Quantum Key Distribution Schemes

- Computer Science, PhysicsArXiv
- 2013

The "fixed-apparatus attack" causes a potential risk to the usefulness of several recent quantum key distribution implementations, and is shown to be totally insecure against a strong eavesdropper that has one-time access to the receiver's equipment.

## References

SHOWING 1-10 OF 37 REFERENCES

Security against individual attacks for realistic quantum key distribution

- Computer Science
- 2000

A formula for the secure bit rate per time slot of an experimental setup is obtained which can be used to optimize the performance of existing schemes for the considered scenario.

A Proof of the Security of Quantum Key Distribution

- Computer Science, MathematicsSTOC '00
- 2000

We prove the security of theoretical quantum key distribution against the most general attacks which can be performed on the channel, by an eavesdropper who has unlimited computation abilities, and…

ESTIMATES FOR PRACTICAL QUANTUM CRYPTOGRAPHY

- Computer Science, Mathematics
- 1999

A protocol for quantum cryptography which is secure against attacks on individual signals based on the Bennett-Brassard protocol of 1984, which gives the probability of a successful key generation and the probability for an eavesdropper's knowledge to be below a specified maximal value.

Secure quantum key distribution with an uncharacterized source.

- Computer SciencePhysical review letters
- 2003

We prove the security of the Bennett-Brassard (BB84) quantum key distribution protocol for an arbitrary source whose averaged states are basis independent, a condition that is automatically satisfied…

Security Aspects of Practical Quantum Cryptography

- Computer ScienceEUROCRYPT
- 2000

This work provides a thorough investigation of security issues for practical quantum key distribution, taking into account channel losses, and a realistic detection process.

Quantum cryptography with imperfect apparatus

- MathematicsProceedings 39th Annual Symposium on Foundations of Computer Science (Cat. No.98CB36280)
- 1998

This paper proposes and gives a concrete design for a new concept, self-checking source, which requires the manufacturer of the photon source to provide certain tests; these tests are designed such that, if passed, the source is guaranteed to be adequate for the security of the quantum key distribution protocol, even though the testing devices may not be built to the original specification.

Secure quantum key distribution using squeezed states

- Physics, Computer Science
- 2001

This proof employs quantum error-correcting codes that encode a finite-dimensional quantum system in the infinite-dimensional Hilbert space of an oscillator, and protect against errors that shift the canonical variables p and q.

Unconditional security in quantum cryptography

- Computer ScienceJACM
- 2001

Basic techniques to prove the unconditional security of quantum crypto graphy are described and a practical variation on the protocol in which the channel is noisy and photos may be lost during the transmission is considered.

Simple proof of security of the BB84 quantum key distribution protocol

- Computer SciencePhysical review letters
- 2000

We prove that the 1984 protocol of Bennett and Brassard (BB84) for quantum key distribution is secure. We first give a key distribution protocol based on entanglement purification, which can be…

Unconditional security of quantum key distribution over arbitrarily long distances

- Computer ScienceScience
- 1999

The problem is solved by showing that, given fault-tolerant quantum computers, quantum key distribution over an arbitrarily long distance of a realistic noisy channel can be made unconditionally secure.