# The security of practical quantum key distribution

@article{Scarani2008TheSO, title={The security of practical quantum key distribution}, author={Valerio Scarani and H. Bechmann-Pasquinucci and Nicolas J. Cerf and Miloslav Du{\vs}ek and Norbert Lutkenhaus and Momtchil Peev}, journal={Reviews of Modern Physics}, year={2008}, volume={81}, pages={1301-1350} }

Quantum key distribution (QKD) is the first quantum information task to reach the level of mature technology, already fit for commercialization. It aims at the creation of a secret key between authorized partners connected by a quantum channel and a classical authenticated channel. The security of the key can in principle be guaranteed without putting any restriction on an eavesdropper's power. This article provides a concise up-to-date review of QKD, biased toward the practical side. Essential…

## 2,199 Citations

### Security of the decoy state method for quantum key distribution

- Computer Science, MathematicsPhysics-Uspekhi
- 2020

The decoy state method is devoted to, a countermeasure against vulnerabilities caused by the use of coherent states of light for QKD protocols whose security is proved under the assumption of single-photon states.

### Quantum Flows for Secret Key Distribution

- Computer Science
- 2018

A new theoretical approach called quantum flows is proposed to be able to detect the eavesdropping activity in the channel without requiring additional optical components different from the BB84 protocol because the system can be implemented as a high software module.

### A Tutorial on Quantum Key Distribution

- Computer Science, Physics2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA)
- 2015

High-speed, long-distance and multi-access QKD technologies and security patches against quantum hacking are both continuously research tendency of QKKD in the future.

### Security of device-independent quantum key distribution protocols: a review

- Computer Science
- 2022

This review will provide an introduction to DI-QKD, an overview of the related experiments performed, and the theory and techniques required to analyse its security, and concludes with an outlook on future DI- QKD research.

### Quantum key distribution protocol with pseudorandom bases

- Computer ScienceArXiv
- 2017

This work considers a novel class of prepare-and-measure QKD protocols, utilizing additional pseudorandomness in the preparation of quantum states, and demonstrates that, for single-photon sources, the considered protocol gives better secret key rates than the BB84 and the asymmetric BB84 protocol.

### Quantum Flows for Secret Key Distribution Quantum Flows for Secret Key Distribution

- Computer Science
- 2018

A new theoretical approach called quantum flows is proposed to be able to detect the eavesdropping activity in the channel without requiring additional optical components different from the BB84 protocol because the system can be implemented as a high software module.

### Measurement-Device-Independent Quantum Cryptography

- Computer ScienceIEEE Journal of Selected Topics in Quantum Electronics
- 2015

A novel approach to quantum key distribution, called measurement-device-independent QKD (mdiQKD), has been proposed, which can remove all side-channels from the measurement unit, arguably the most vulnerable part in QKKD systems, thus offering a clear avenue toward secure QkD realisations.

### Towards the unconditional security proof for the Coherent-One-Way protocol

- Computer Science, Mathematics
- 2011

This work presents a necessary condition for the security of the COW protocol, and shows that Bob’s measurements are described by non-commuting POVM elements which satisfies this condition.

### Authenticated multi-user quantum key distribution with single particles

- Computer Science
- 2016

An efficient authenticated multi-user quantum key distribution protocol with single particles that any two users on a quantum network can perform mutual authentication and share a secure session key with the assistance of a semi-honest center is proposed.

## References

SHOWING 1-10 OF 355 REFERENCES

### Unconditional security of practical quantum key distribution

- Computer Science
- 2007

This paper is identical to the preprint arXiv:quant-ph/0107017, which was finalized in 2001, therefore, some of the more recent developments, including the question of composability, are not addressed.

### Decoy state quantum key distribution.

- Physics, Computer SciencePhysical review letters
- 2005

The method is to use decoy states to detect eavesdropping attacks and has the best of both worlds--enjoying unconditional security guaranteed by the fundamental laws of physics and yet dramatically surpassing some of the best experimental performances reported in the literature.

### Practical evaluation of security for quantum key distribution

- Computer Science
- 2006

A tight upper bound of the eavesdropper's information is derived, which is better than existing bounds, and the exponential rate of the microphones' information is obtained by using the normal distribution.

### Architecture and protocols of the future European quantum key distribution network

- Computer ScienceSecur. Commun. Networks
- 2008

The important aspects of the architecture and the network layer protocols of the SeCoQC QKD network are discussed, which will be demonstrated in September 2008.

### Reconciliation of a quantum-distributed Gaussian key

- Computer ScienceIEEE Transactions on Information Theory
- 2004

A novel construction is presented that allows the legitimate parties to get equal bit strings out of correlated variables by using a classical channel, with as little leaked information as possible, which opens the way to securely correcting nonbinary key elements.

### Continuous variable quantum cryptography using coherent states.

- Physics, Computer SciencePhysical review letters
- 2002

We propose several methods for quantum key distribution (QKD) based on the generation and transmission of random distributions of coherent or squeezed states, and we show that they are secure against…

### Quantum Key Distribution Based on Private States: Unconditional Security Over Untrusted Channels With Zero Quantum Capacity

- Computer ScienceIEEE Transactions on Information Theory
- 2008

This paper proves unconditional security for a quantum key distribution protocol based on distilling pbits (twisted ebits) from an arbitrary untrusted state that is claimed to contain distillable key using only public communication-via parameter estimation of the given untr trusted state.

### Security aspects of practical quantum cryptography

- Computer ScienceConference Digest. 2000 International Quantum Electronics Conference (Cat. No.00TH8504)
- 2000

This work provides a thorough investigation of security issues for practical quantum key distribution, taking into account channel losses, and a realistic detection process.

### Practical long-distance quantum key distribution system using decoy levels

- Physics
- 2009

Quantum key distribution (QKD) has the potential for widespread real-world applications, but no secure long-distance experiment has demonstrated the truly practical operation needed to move QKD from…

### Phase-Remapping Attack in Practical Quantum Key Distribution Systems

- Computer ScienceArXiv
- 2006

A phase-remapping attack targeting two practical bidirectional QKD systems showing that if the users of the systems are unaware of the attack, the final key shared between them can be compromised in some situations, and that the attack is feasible with only current technology.