# The security of practical quantum key distribution

@article{Scarani2008TheSO, title={The security of practical quantum key distribution}, author={Valerio Scarani and H. Bechmann-Pasquinucci and Nicolas J. Cerf and Miloslav Du{\vs}ek and Norbert Lutkenhaus and Momtchil Peev}, journal={Reviews of Modern Physics}, year={2008}, volume={81}, pages={1301-1350} }

Quantum key distribution (QKD) is the first quantum information task to reach the level of mature technology, already fit for commercialization. It aims at the creation of a secret key between authorized partners connected by a quantum channel and a classical authenticated channel. The security of the key can in principle be guaranteed without putting any restriction on an eavesdropper's power. This article provides a concise up-to-date review of QKD, biased toward the practical side. Essential…

## 2,317 Citations

### Security of the decoy state method for quantum key distribution

- Computer Science, MathematicsPhysics-Uspekhi
- 2020

The decoy state method is devoted to, a countermeasure against vulnerabilities caused by the use of coherent states of light for QKD protocols whose security is proved under the assumption of single-photon states.

### Quantum Flows for Secret Key Distribution

- Computer Science
- 2018

A new theoretical approach called quantum flows is proposed to be able to detect the eavesdropping activity in the channel without requiring additional optical components different from the BB84 protocol because the system can be implemented as a high software module.

### A Tutorial on Quantum Key Distribution

- Computer Science, Physics2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA)
- 2015

High-speed, long-distance and multi-access QKD technologies and security patches against quantum hacking are both continuously research tendency of QKKD in the future.

### Security of device-independent quantum key distribution protocols: a review

- Computer Science
- 2022

This review will provide an introduction to DI-QKD, an overview of the related experiments performed, and the theory and techniques required to analyse its security, and concludes with an outlook on future DI- QKD research.

### Quantum key distribution protocol with pseudorandom bases

- Computer ScienceArXiv
- 2017

This work considers a novel class of prepare-and-measure QKD protocols, utilizing additional pseudorandomness in the preparation of quantum states, and demonstrates that, for single-photon sources, the considered protocol gives better secret key rates than the BB84 and the asymmetric BB84 protocol.

### Quantum Flows for Secret Key Distribution Quantum Flows for Secret Key Distribution

- Computer Science
- 2018

A new theoretical approach called quantum flows is proposed to be able to detect the eavesdropping activity in the channel without requiring additional optical components different from the BB84 protocol because the system can be implemented as a high software module.

### Measurement-Device-Independent Quantum Cryptography

- Computer ScienceIEEE Journal of Selected Topics in Quantum Electronics
- 2015

A novel approach to quantum key distribution, called measurement-device-independent QKD (mdiQKD), has been proposed, which can remove all side-channels from the measurement unit, arguably the most vulnerable part in QKKD systems, thus offering a clear avenue toward secure QkD realisations.

### Authenticated multi-user quantum key distribution with single particles

- Computer Science
- 2016

An efficient authenticated multi-user quantum key distribution protocol with single particles that any two users on a quantum network can perform mutual authentication and share a secure session key with the assistance of a semi-honest center is proposed.

### Full-field implementation of a perfect eavesdropper on a quantum cryptography system.

- Computer Science, MathematicsNature communications
- 2011

It is shown that non-idealities in physical implementations of QKD can be fully practically exploitable, and must be given increased scrutiny if quantum cryptography is to become highly secure.

## References

SHOWING 1-10 OF 354 REFERENCES

### Unconditional security of practical quantum key distribution

- Computer Science
- 2007

This paper is identical to the preprint arXiv:quant-ph/0107017, which was finalized in 2001, therefore, some of the more recent developments, including the question of composability, are not addressed.

### Decoy state quantum key distribution.

- Physics, Computer SciencePhysical review letters
- 2005

The method is to use decoy states to detect eavesdropping attacks and has the best of both worlds--enjoying unconditional security guaranteed by the fundamental laws of physics and yet dramatically surpassing some of the best experimental performances reported in the literature.

### Experimental quantum key distribution with decoy states.

- Computer Science, PhysicsPhysical review letters
- 2006

By making simple modifications to a commercial quantum key distribution system, it is shown that a secure key generation rate of 165 bit/s, which is 1/4 of the theoretical limit, can be obtained over 15 km of a telecommunication fiber.

### Practical evaluation of security for quantum key distribution

- Computer Science
- 2006

A tight upper bound of the eavesdropper's information is derived, which is better than existing bounds, and the exponential rate of the microphones' information is obtained by using the normal distribution.

### Architecture and protocols of the future European quantum key distribution network

- Computer ScienceSecur. Commun. Networks
- 2008

The important aspects of the architecture and the network layer protocols of the SeCoQC QKD network are discussed, which will be demonstrated in September 2008.

### Reconciliation of a quantum-distributed Gaussian key

- Computer ScienceIEEE Transactions on Information Theory
- 2004

A novel construction is presented that allows the legitimate parties to get equal bit strings out of correlated variables by using a classical channel, with as little leaked information as possible, which opens the way to securely correcting nonbinary key elements.

### Continuous variable quantum cryptography using coherent states.

- Physics, Computer SciencePhysical review letters
- 2002

We propose several methods for quantum key distribution (QKD) based on the generation and transmission of random distributions of coherent or squeezed states, and we show that they are secure against…

### Quantum Key Distribution Based on Private States: Unconditional Security Over Untrusted Channels With Zero Quantum Capacity

- Computer ScienceIEEE Transactions on Information Theory
- 2008

This paper proves unconditional security for a quantum key distribution protocol based on distilling pbits (twisted ebits) from an arbitrary untrusted state that is claimed to contain distillable key using only public communication-via parameter estimation of the given untr trusted state.

### Security aspects of practical quantum cryptography

- Computer ScienceConference Digest. 2000 International Quantum Electronics Conference (Cat. No.00TH8504)
- 2000

This work provides a thorough investigation of security issues for practical quantum key distribution, taking into account channel losses, and a realistic detection process.

### Secure quantum key distribution using squeezed states

- Physics, Computer Science
- 2001

This proof employs quantum error-correcting codes that encode a finite-dimensional quantum system in the infinite-dimensional Hilbert space of an oscillator, and protect against errors that shift the canonical variables p and q.