The security of practical quantum key distribution

@article{Scarani2009TheSO,
  title={The security of practical quantum key distribution},
  author={Valerio Scarani and H. Bechmann-Pasquinucci and Nicolas J. Cerf and Miloslav Du{\vs}ek and Norbert Lutkenhaus and Momtchil Peev},
  journal={Reviews of Modern Physics},
  year={2009},
  volume={81},
  pages={1301-1350}
}
Quantum key distribution (QKD) is the first quantum information task to reach the level of mature technology, already fit for commercialization. It aims at the creation of a secret key between authorized partners connected by a quantum channel and a classical authenticated channel. The security of the key can in principle be guaranteed without putting any restriction on an eavesdropper's power. This article provides a concise up-to-date review of QKD, biased toward the practical side. Essential… Expand

Figures and Tables from this paper

A Survey of Quantum Key Distribution (QKD) Technologies
Quantum Key Distribution (QKD) is a revolutionary security technology that exploits the laws of quantum mechanics to achieve information-theoretic secure key exchange. QKD enables two parties toExpand
Quantum Flows for Secret Key Distribution
TLDR
A new theoretical approach called quantum flows is proposed to be able to detect the eavesdropping activity in the channel without requiring additional optical components different from the BB84 protocol because the system can be implemented as a high software module. Expand
Security of the decoy state method for quantum key distribution
TLDR
The decoy state method is devoted to, a countermeasure against vulnerabilities caused by the use of coherent states of light for QKD protocols whose security is proved under the assumption of single-photon states. Expand
A Tutorial on Quantum Key Distribution
TLDR
High-speed, long-distance and multi-access QKD technologies and security patches against quantum hacking are both continuously research tendency of QKKD in the future. Expand
Recent Advances on Quantum Key Distribution Overcoming the Linear Secret Key Capacity Bound
TLDR
An up-to-date survey on recent developments in quantum key distribution, including the security proofs of phase-matching QKD and other TF-QKD type protocols, the theoretical examinations of these protocols under realistic conditions, and the recent experimental demonstrations are presented. Expand
Quantum key distribution protocol with pseudorandom bases
TLDR
This work considers a novel class of prepare-and-measure QKD protocols, utilizing additional pseudorandomness in the preparation of quantum states, and demonstrates that, for single-photon sources, the considered protocol gives better secret key rates than the BB84 and the asymmetric BB84 protocol. Expand
Measurement-Device-Independent Quantum Cryptography
In theory, quantum key distribution (QKD) provides information-theoretic security based on the laws of physics. Owing to the imperfections of real-life implementations, however, there is a big gapExpand
Towards the unconditional security proof for the Coherent-One-Way protocol
Quantum Cryptography, one aspect of which is Quantum Key Distribution, provides the only physically secure and proven method for the transmission of a secret key between two distant parties, AliceExpand
Authenticated multi-user quantum key distribution with single particles
TLDR
An efficient authenticated multi-user quantum key distribution protocol with single particles that any two users on a quantum network can perform mutual authentication and share a secure session key with the assistance of a semi-honest center is proposed. Expand
Full-field implementation of a perfect eavesdropper on a quantum cryptography system.
TLDR
It is shown that non-idealities in physical implementations of QKD can be fully practically exploitable, and must be given increased scrutiny if quantum cryptography is to become highly secure. Expand
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 648 REFERENCES
Unconditional security of practical quantum key distribution
TLDR
This paper is identical to the preprint arXiv:quant-ph/0107017, which was finalized in 2001, therefore, some of the more recent developments, including the question of composability, are not addressed. Expand
Decoy state quantum key distribution.
TLDR
The method is to use decoy states to detect eavesdropping attacks and has the best of both worlds--enjoying unconditional security guaranteed by the fundamental laws of physics and yet dramatically surpassing some of the best experimental performances reported in the literature. Expand
Practical evaluation of security for quantum key distribution
Many papers have proven the security of quantum key distribution (QKD) systems in the asymptotic framework. The degree of the security has not been discussed in the finite coding-length framework,Expand
Experimental quantum key distribution with decoy states.
TLDR
By making simple modifications to a commercial quantum key distribution system, it is shown that a secure key generation rate of 165 bit/s, which is 1/4 of the theoretical limit, can be obtained over 15 km of a telecommunication fiber. Expand
Architecture and protocols of the future European quantum key distribution network
TLDR
The important aspects of the architecture and the network layer protocols of the SeCoQC QKD network are discussed, which will be demonstrated in September 2008. Expand
Reconciliation of a quantum-distributed Gaussian key
TLDR
A novel construction is presented that allows the legitimate parties to get equal bit strings out of correlated variables by using a classical channel, with as little leaked information as possible, which opens the way to securely correcting nonbinary key elements. Expand
Quantum Key Distribution Based on Private States: Unconditional Security Over Untrusted Channels With Zero Quantum Capacity
TLDR
This paper proves unconditional security for a quantum key distribution protocol based on distilling pbits (twisted ebits) from an arbitrary untrusted state that is claimed to contain distillable key using only public communication-via parameter estimation of the given untr trusted state. Expand
Continuous variable quantum cryptography using coherent states.
We propose several methods for quantum key distribution (QKD) based on the generation and transmission of random distributions of coherent or squeezed states, and we show that they are secure againstExpand
Secure quantum key distribution using squeezed states
We prove the security of a quantum key distribution scheme based on transmission of squeezed quantum states of a harmonic oscillator. Our proof employs quantum error-correcting codes that encode aExpand
Practical long-distance quantum key distribution system using decoy levels
Quantum key distribution (QKD) has the potential for widespread real-world applications, but no secure long-distance experiment has demonstrated the truly practical operation needed to move QKD fromExpand
...
1
2
3
4
5
...