Unconditional security of practical quantum key distribution

2007 ◽  
Vol 41 (3) ◽  
pp. 599-627 ◽  
Author(s):  
H. Inamori ◽  
N. Lütkenhaus ◽  
D. Mayers
2021 ◽  
Vol 11 (1) ◽  
Author(s):  
Byoung S. Ham

AbstractSo far, unconditional security in key distribution processes has been confined to quantum key distribution (QKD) protocols based on the no-cloning theorem of nonorthogonal bases. Recently, a completely different approach, the unconditionally secured classical key distribution (USCKD), has been proposed for unconditional security in the purely classical regime. Unlike QKD, both classical channels and orthogonal bases are key ingredients in USCKD, where unconditional security is provided by deterministic randomness via path superposition-based reversible unitary transformations in a coupled Mach–Zehnder interferometer. Here, the first experimental demonstration of the USCKD protocol is presented.


2014 ◽  
Vol 112 (12) ◽  
Author(s):  
Zheshen Zhang ◽  
Jacob Mower ◽  
Dirk Englund ◽  
Franco N. C. Wong ◽  
Jeffrey H. Shapiro

2005 ◽  
Vol 94 (4) ◽  
Author(s):  
J.-C. Boileau ◽  
K. Tamaki ◽  
J. Batuwantudawe ◽  
R. Laflamme ◽  
J. M. Renes

2009 ◽  
Vol 9 (1&2) ◽  
pp. 131-165
Author(s):  
C.-H. F. Fung ◽  
K. Tamaki ◽  
B. Qi ◽  
H.-K. Lo ◽  
X. Ma

In theory, quantum key distribution (QKD) offers unconditional security based on the laws of physics. However, as demonstrated in recent quantum hacking theory and experimental papers, detection efficiency loophole can be fatal to the security of practical QKD systems. Here, we describe the physical origin of detection efficiency mismatch in various domains including spatial, spectral, and time domains and in various experimental set-ups. More importantly, we prove the unconditional security of QKD even with detection efficiency mismatch. We explicitly show how the key generation rate is characterized by the maximal detection efficiency ratio between the two detectors. Furthermore, we prove that by randomly switching the bit assignments of the detectors, the effect of detection efficiency mismatch can be completely eliminated.


2003 ◽  
Vol 3 (6) ◽  
pp. 581-602
Author(s):  
D. Gottesman

Quantum states cannot be cloned. I show how to extend this property to classical messages encoded using quantum states, a task I call ``uncloneable encryption.'' An uncloneable encryption scheme has the property that an eavesdropper Eve not only cannot read the encrypted message, but she cannot copy it down for later decoding. She could steal it, but then the receiver Bob would not receive the message, and would thus be alerted that something was amiss. I prove that any authentication scheme for quantum states acts as a secure uncloneable encryption scheme. Uncloneable encryption is also closely related to quantum key distribution (QKD), demonstrating a close connection between cryptographic tasks for quantum states and for classical messages. Thus, studying uncloneable encryption and quantum authentication allows for some modest improvements in QKD protocols. While the main results apply to a one-time key with unconditional security, I also show uncloneable encryption remains secure with a pseudorandom key. In this case, to defeat the scheme, Eve must break the computational assumption behind the pseudorandom sequence before Bob receives the message, or her opportunity is lost. This means uncloneable encryption can be used in a non-interactive setting, where QKD is not available, allowing Alice and Bob to convert a temporary computational assumption into a permanently secure message.


2001 ◽  
Vol 1 (2) ◽  
pp. 81-94
Author(s):  
Hoi-Kwong Lo

We prove the unconditional sercurity of the standard six-state scheme for quantum key distribution (QKD).


Sign in / Sign up

Export Citation Format

Share Document