Getting something out of nothing

We study quantum key distribution with standard weak coherent states and show, rather counter-intuitively, that the detection events originated from vacua can contribute to secure key generation rate, over and above the best prior art result. Our proof is based on a communication complexity/quantum memory argument. The key observation is that Eve does not have to store anything, if Alice sends out a vacuum state.

[1]  H. Inamori,et al.  Unconditional security of practical quantum key distribution , 2007 .

[2]  Xiang‐Bin Wang,et al.  Beating the PNS attack in practical quantum cryptography , 2004 .

[3]  P. Oscar Boykin,et al.  A Proof of the Security of Quantum Key Distribution , 1999, STOC '00.

[4]  Won-Young Hwang Quantum key distribution with high loss: toward global secure communication. , 2003, Physical review letters.

[5]  Robert König,et al.  Universally Composable Privacy Amplification Against Quantum Adversaries , 2004, TCC.

[6]  Xiang-Bin Wang A decoy-state protocol for quantum cryptography with 4 intensities of coherent states , 2008 .

[7]  R. Renner,et al.  A Generic Security Proof for Quantum Key Distribution , 2004, quant-ph/0402131.

[8]  Hoi-Kwong Lo,et al.  Proof of security of quantum key distribution with two-way classical communications , 2001, IEEE Trans. Inf. Theory.

[9]  Xiongfeng Ma,et al.  Decoy state quantum key distribution. , 2004, Physical review letters.

[10]  H. Lo,et al.  Practical Decoy State for Quantum Key Distribution , 2005, quant-ph/0503005.

[11]  Shor,et al.  Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.

[12]  David Deutsch,et al.  Erratum: Quantum Privacy Amplification and the Security of Quantum Cryptography over Noisy Channels [Phys. Rev. Lett. 77, 2818 (1996)] , 1998 .

[13]  Yi Zhao,et al.  Experimental Decoy State Quantum Key Distribution Over 15km , 2005 .

[14]  J. M. Ettinger,et al.  Enhancing practical security of quantum key distribution with a few decoy states , 2005, quant-ph/0503002.

[15]  Ekert,et al.  Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.

[16]  J. Oppenheim,et al.  Secure key from bound entanglement. , 2003, Physical Review Letters.

[17]  Hoi-Kwong Lo,et al.  Efficient Quantum Key Distribution Scheme and a Proof of Its Unconditional Security , 2004, Journal of Cryptology.

[18]  John Preskill,et al.  Security of quantum key distribution with imperfect devices , 2002, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..

[19]  Dominic Mayers,et al.  Quantum Key Distribution and String Oblivious Transfer in Noisy Channels , 1996, CRYPTO.