Unconditional security of practical quantum key distribution

作者: H. Inamori , N. Lütkenhaus , D. Mayers

DOI: 10.1140/EPJD/E2007-00010-4

关键词: BB84Key (cryptography)Computer engineeringQuantum key distributionDecoy stateQuantum cryptographyProtocol (object-oriented programming)ComposabilityQuantum mechanicsQuantum information scienceComputer science

摘要: We present a complete protocol for BB84 quantum key distribution realistic setting (noise, loss, multi-photon signals of the source) that covers many todays experimental implementations. The security this is shown against an eavesdropper having unrestricted power to manipulate coherently on their path from sender receiver. and proof take into account effects concerning finite size generated key. This paper identical preprint arXiv:quant-ph/0107017, which was finalized in 2001. Therefore, some more recent developments, including question composability, are not addressed.

参考文章(20)
Eli Biham, Tal Mor, Security of Quantum Cryptography against Collective Attacks Physical Review Letters. ,vol. 78, pp. 2256- 2259 ,(1997) , 10.1103/PHYSREVLETT.78.2256
Gilles Brassard, Norbert Lütkenhaus, Tal Mor, Barry C. Sanders, Limitations on Practical Quantum Cryptography Physical Review Letters. ,vol. 85, pp. 1330- 1333 ,(2000) , 10.1103/PHYSREVLETT.85.1330
Horace P Yuen, Quantum amplifiers, quantum duplicators and quantum cryptography Quantum and Semiclassical Optics: Journal of The European Optical Society Part B. ,vol. 8, pp. 939- 949 ,(1996) , 10.1088/1355-5111/8/4/015
Hoi-Kwong Lo, Hoi Fung Chau, Unconditional Security of Quantum Key Distribution over Arbitrarily Long Distances Science. ,vol. 283, pp. 2050- 2056 ,(1999) , 10.1126/SCIENCE.283.5410.2050
J.I Cirac, J.I Cirac, N Gisin, Coherent eavesdropping strategies for the four state quantum cryptography protocol Physics Letters A. ,vol. 229, pp. 1- 7 ,(1997) , 10.1016/S0375-9601(97)00176-X
Charles H. Bennett, François Bessette, Gilles Brassard, Louis Salvail, John Smolin, Experimental quantum cryptography theory and application of cryptographic techniques. ,vol. 5, pp. 253- 265 ,(1991) , 10.1007/3-540-46877-3_23
M. Bourennane, F. Gibson, Anders Karlsson, A. Hening, P. Jonsson, T. Tsegaye, D. Ljunggren, E. Sundberg, Experiments on long wavelength (1550 nm) "plug and play" quantum cryptography systems. Optics Express. ,vol. 4, pp. 383- 387 ,(1999) , 10.1364/OE.4.000383
Bruno Huttner, Artur K. Ekert, Information Gain in Quantum Eavesdropping Journal of Modern Optics. ,vol. 41, pp. 2455- 2466 ,(1994) , 10.1080/09500349414552301
Eli Biham, Michel Boyer, P. Oscar Boykin, Tal Mor, Vwani Roychowdhury, A proof of the security of quantum key distribution (extended abstract) symposium on the theory of computing. pp. 715- 724 ,(2000) , 10.1145/335305.335406
Peter W. Shor, John Preskill, Simple proof of security of the BB84 quantum key distribution protocol Physical Review Letters. ,vol. 85, pp. 441- 444 ,(2000) , 10.1103/PHYSREVLETT.85.441