A Survey on Quantum Cryptographic Protocols and Their Security

Communications in secrecy are often required in many commercial and military applications. Unfortunately, many cryptographic schemes in use today such as public-key cryptography based on the RSA algorithm would be broken with either unanticipated advances in hardware and algorithm or the advent of quantum computers. Quantum cryptography, on the other hand, has been proven secure even against the most general attack allowed by the laws of physics and is a promising technology poised for widespread adoption in realistic cryptographic applications. Quantum cryptography allows two parties to expand on a secret key that they have previously shared. Various quantum cryptographic protocols have been proposed to perform this task. In this paper, we survey some popular quantum cryptographic protocols (including the famous Bennett-Brassard 1984 protocol) and discuss their security. Specifically, we consider their security in two cases: the ideal case where a perfect single-photon source is used and the practical case where a realistic laser source is used. We compare the protocols and find that the efficient six-state protocol outperforms the others both in the tolerable quantum bit error rate and in the key generation rate when a realistic laser source is used.

[1]  V. Scarani,et al.  Zero-error attacks and detection statistics in the coherent one-way protocol for quantum cryptography , 2006, Quantum Inf. Comput..

[2]  H. Lo,et al.  Discrete rotational symmetry and quantum-key-distribution protocols , 2006, quant-ph/0604198.

[3]  Hoi-Kwong Lo,et al.  Security proof of a three-state quantum-key-distribution protocol without rotational symmetry , 2006 .

[4]  H. Lo,et al.  Performance of two quantum-key-distribution protocols , 2006 .

[5]  H. Lo,et al.  Unconditionally secure key distillation from multiphotons , 2004, quant-ph/0412035.

[6]  M. Koashi Security of quantum key distribution with discrete rotational symmetry , 2005, quant-ph/0507154.

[7]  Xiang‐Bin Wang,et al.  Beating the photon-number-splitting attack in practical quantum cryptography. , 2004, Physical review letters.

[8]  R. Laflamme,et al.  Unconditional security of a three state quantum key distribution protocol. , 2004, Physical review letters.

[9]  Z. Yuan,et al.  Quantum key distribution over 122 km of standard telecom fiber , 2004, quant-ph/0412171.

[10]  John Preskill,et al.  Security of quantum key distribution with imperfect devices , 2002, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..

[11]  Nicolas Gisin,et al.  Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations. , 2004, Physical review letters.

[12]  H. Chau,et al.  Efficient Quantum Key Distribution Scheme and a Proof of Its Unconditional Security , 2000, Journal of Cryptology.

[13]  Won-Young Hwang Quantum key distribution with high loss: toward global secure communication. , 2003, Physical review letters.

[14]  Hoi-Kwong Lo,et al.  Proof of unconditional security of six-state quantum key distribution scheme , 2001, Quantum Inf. Comput..

[15]  Shor,et al.  Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.

[16]  Simon J. D. Phoenix,et al.  Three-state quantum cryptography , 2000 .

[17]  H. Chau,et al.  Unconditional security of quantum key distribution over arbitrarily long distances , 1998, Science.

[18]  D. Bruß Optimal Eavesdropping in Quantum Cryptography with Six States , 1998, quant-ph/9805019.