Quantum Key Distribution: A Resource Letter

Quantum key distribution (QKD) is one of the best-known examples of an application of quantum mechanics to cryptography. This article serves as a resource letter, a brief description to the introduction of QKD is provided before surveying the most prominent QKD protocols present in the literature from theoretical initialization by Wiesner to the attempts at practical implementations. We have also given an overview of the different security proofs proposed, for the variations in protocols and highlighted their significance.

[1]  Hoi-Kwong Lo,et al.  Proof of security of quantum key distribution with two-way classical communications , 2001, IEEE Trans. Inf. Theory.

[2]  H. Bechmann-Pasquinucci,et al.  Incoherent and coherent eavesdropping in the six-state protocol of quantum cryptography , 1998, quant-ph/9807041.

[3]  Won-Young Hwang Quantum key distribution with high loss: toward global secure communication. , 2003, Physical review letters.

[4]  Andrew Chi-Chih Yao,et al.  Quantum cryptography with imperfect apparatus , 1998, Proceedings 39th Annual Symposium on Foundations of Computer Science (Cat. No.98CB36280).

[5]  V. Scarani,et al.  Device-independent security of quantum cryptography against collective attacks. , 2007, Physical review letters.

[6]  J. Rarity,et al.  Enhanced single photon fringe visibility in a 10 km-long prototype quantum cryptography channel , 1993 .

[7]  N. Lütkenhaus Security against individual attacks for realistic quantum key distribution , 2000 .

[8]  John Preskill,et al.  Security of quantum key distribution with imperfect devices , 2002, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..

[9]  H. Chau,et al.  Efficient Quantum Key Distribution , 1998, quant-ph/9803007.

[10]  Stephen Wiesner,et al.  Conjugate coding , 1983, SIGA.

[11]  Shor,et al.  Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.

[12]  Adrian Kent,et al.  No signaling and quantum key distribution. , 2004, Physical review letters.

[13]  Gilles Brassard,et al.  Experimental Quantum Cryptography , 1990, EUROCRYPT.

[14]  A. Acín,et al.  Secure device-independent quantum key distribution with causally independent measurement devices. , 2010, Nature communications.

[15]  Michael O. Rabin,et al.  How To Exchange Secrets with Oblivious Transfer , 2005, IACR Cryptol. ePrint Arch..

[16]  N. Gisin,et al.  Quantum cryptography , 1998 .

[17]  Renato Renner,et al.  Security of quantum key distribution , 2005, Ausgezeichnete Informatikdissertationen.

[18]  N. Gisin,et al.  Quantum Cryptography with Polarized Photons in Optical Fibres: Experiment and Practical Limits , 1994 .

[19]  Yeshaiahu Fainman,et al.  Security of quantum cryptography against individual attacks , 1998 .

[20]  Jörn Müller-Quade,et al.  Composability in quantum cryptography , 2009, ArXiv.

[21]  Ekert,et al.  Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.

[22]  B Baek,et al.  Long Distance Quantum Key Distribution in Optical Fiber , 2008, OFC/NFOEC 2008 - 2008 Conference on Optical Fiber Communication/National Fiber Optic Engineers Conference.

[23]  Sae Woo Nam,et al.  Quantum key distribution over a 40-dB channel loss using superconducting single-photon detectors , 2007, 0706.0397.

[24]  Richard J. Hughes,et al.  Quantum key distribution over a 48 km optical fibre network , 1999, quant-ph/9904038.

[25]  D. Bruß,et al.  Optimal eavesdropping in cryptography with three-dimensional quantum states. , 2001, Physical review letters.

[26]  Gilles Brassard,et al.  Experimental quantum cryptography: the dawn of a new era for quantum cryptography: the experimental prototype is working] , 1989, SIGACT News.

[27]  Debbie W. Leung,et al.  The Universal Composable Security of Quantum Key Distribution , 2004, TCC.

[28]  Lo,et al.  Unconditional security of quantum key distribution over arbitrarily long distances , 1999, Science.

[29]  Yi Zhao,et al.  Experimental quantum key distribution with decoy states. , 2006, Physical review letters.

[30]  Gilles Brassard,et al.  Quantum Cryptography , 2005, Encyclopedia of Cryptography and Security.

[31]  W. Dur,et al.  Quantum repeaters for communication , 1998 .

[32]  V. Scarani,et al.  The security of practical quantum key distribution , 2008, 0802.4155.

[33]  Anders Karlsson,et al.  Security of quantum key distribution using d-level systems. , 2001, Physical review letters.

[34]  Jian-Wei Pan,et al.  Experimental demonstration of a BDCZ quantum repeater node , 2008, Nature.

[35]  Douglas Stebila,et al.  The Case for Quantum Key Distribution , 2009, QuantumComm.

[36]  Weinfurter,et al.  Quantum cryptography with entangled photons , 1999, Physical review letters.

[37]  H. Inamori,et al.  Unconditional security of practical quantum key distribution , 2007 .

[38]  H. Weinfurter,et al.  Distributing entanglement and single photons through an intra-city, free-space quantum channel , 2005, EQEC '05. European Quantum Electronics Conference, 2005..

[39]  N. Gisin,et al.  Long-distance entanglement-based quantum key distribution , 2000, quant-ph/0008039.

[40]  Yeshaiahu Fainman,et al.  Security of quantum cryptography against individual attacks , 1998, Other Conferences.

[41]  Nicolas Gisin,et al.  Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations. , 2004, Physical review letters.

[42]  Sanders,et al.  Limitations on practical quantum cryptography , 2000, Physical review letters.

[43]  Thierry Paul,et al.  Quantum computation and quantum information , 2007, Mathematical Structures in Computer Science.

[44]  Hiroki Takesue,et al.  Differential-phase-shift quantum key distribution , 2009, 2006 Digest of the LEOS Summer Topical Meetings.

[45]  N. Lutkenhaus Security against individual attacks for realistic quantum key distribution , 1999, quant-ph/9910093.

[46]  J. Preskill Fault-tolerant quantum computation , 1997, quant-ph/9712048.

[47]  Goldenberg,et al.  Quantum cryptography based on orthogonal states. , 1995, Physical review letters.

[48]  N. Gisin,et al.  Experimental Demonstration of Quantum Cryptography Using Polarized Photons in Optical Fibre over More than 1 km , 1993 .

[49]  Dominic Mayers,et al.  Unconditional security in quantum cryptography , 1998, JACM.

[50]  C. G. Peterson,et al.  Long-distance quantum key distribution in optical fibre , 2006, quant-ph/0607177.

[51]  Charles H. Bennett,et al.  Quantum cryptography using any two nonorthogonal states. , 1992, Physical review letters.

[52]  Z. Yuan,et al.  Quantum key distribution over 122 km of standard telecom fiber , 2004, quant-ph/0412171.

[53]  V. Scarani,et al.  Towards practical and fast Quantum Cryptography , 2004, quant-ph/0411022.

[54]  Gilles Brassard,et al.  Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..