Unconditional security at a low cost

By simulating four quantum key distribution (QKD) experiments and analyzing one decoy-state QKD experiment, we compare two data postprocessing schemes based on security against individual attack by Luetkenhaus, and unconditional security analysis by Gottesman-Lo-Luetkenhaus-Preskill. Our results show that these two schemes yield close performances. In QKD, since unconditional security is highly sought after, we conclude that one is better off considering unconditional security, rather than restricting to individual attacks.

[1]  Lo,et al.  Unconditional security of quantum key distribution over arbitrarily long distances , 1999, Science.

[2]  Yi Zhao,et al.  Experimental quantum key distribution with decoy states. , 2006, Physical review letters.

[3]  C. G. Peterson,et al.  Long-distance quantum key distribution in optical fibre , 2006, quant-ph/0607177.

[4]  Z. Yuan,et al.  Unconditionally secure quantum key distribution over 50 km of standard telecom fibre , 2004, quant-ph/0412173.

[5]  N. Gisin,et al.  Quantum cryptography , 1998 .

[6]  P. Townsend Experimental investigation of the performance limits for first telecommunications-window quantum cryptography systems , 1998 .

[7]  J. Preskill,et al.  Phase randomization improves the security of quantum key distribution , 2005, quant-ph/0504209.

[8]  Xiongfeng Ma,et al.  Decoy state quantum key distribution. , 2004, Physical review letters.

[9]  Sanders,et al.  Limitations on practical quantum cryptography , 2000, Physical review letters.

[10]  John Preskill,et al.  Security of quantum key distribution with imperfect devices , 2002, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..

[11]  Nicolas Gisin,et al.  Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations. , 2004, Physical review letters.

[12]  Dominic Mayers,et al.  Unconditional security in quantum cryptography , 1998, JACM.

[13]  H. Inamori,et al.  Unconditional security of practical quantum key distribution , 2007 .

[14]  N. Gisin,et al.  Faint laser quantum key distribution: Eavesdropping exploiting multiphoton pulses , 2001, quant-ph/0102062.

[15]  Xiang‐Bin Wang,et al.  Beating the PNS attack in practical quantum cryptography , 2004 .

[16]  J. M. Ettinger,et al.  Enhancing practical security of quantum key distribution with a few decoy states , 2005, quant-ph/0503002.

[17]  Gilles Brassard,et al.  Secret-Key Reconciliation by Public Discussion , 1994, EUROCRYPT.

[18]  Ekert,et al.  Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.

[19]  B Baek,et al.  Long Distance Quantum Key Distribution in Optical Fiber , 2008, OFC/NFOEC 2008 - 2008 Conference on Optical Fiber Communication/National Fiber Optic Engineers Conference.

[20]  N. Lutkenhaus,et al.  Quantum key distribution with realistic states: photon-number statistics in the photon-number splitting attack , 2001, quant-ph/0112147.

[21]  Jian-Wei Pan,et al.  Experimental long-distance decoy-state quantum key distribution based on polarization encoding. , 2006, Physical review letters.

[22]  Gisin,et al.  Quantum cryptography with coherent states. , 1995, Physical review. A, Atomic, molecular, and optical physics.

[23]  John Preskill,et al.  Secure quantum key distribution with an uncharacterized source. , 2003, Physical review letters.

[24]  P.D. Townsend,et al.  Experimental investigation of the performance limits for first telecommunications-window quantum cryptography systems , 1998, IEEE Photonics Technology Letters.

[25]  Norbert Lütkenhaus,et al.  ul 2 00 1 Unconditional Security of Practical Quantum Key Distribution , 2008 .

[26]  N. Lutkenhaus Security against individual attacks for realistic quantum key distribution , 1999, quant-ph/9910093.

[27]  Li Qian,et al.  Simulation and Implementation of Decoy State Quantum Key Distribution over 60km Telecom Fiber , 2006, 2006 IEEE International Symposium on Information Theory.

[28]  N. Gisin,et al.  Automated 'plug & play' quantum key distribution , 1998, quant-ph/9812052.

[29]  Shor,et al.  Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.

[30]  Gilles Brassard,et al.  Quantum Cryptography , 2005, Encyclopedia of Cryptography and Security.

[31]  H. Lo,et al.  Unconditionally secure key distillation from multiphotons , 2004, quant-ph/0412035.

[32]  Barry C. Sanders,et al.  Security Aspects of Practical Quantum Cryptography , 2000, EUROCRYPT.

[33]  Won-Young Hwang Quantum key distribution with high loss: toward global secure communication. , 2003, Physical review letters.

[34]  Andrew Chi-Chih Yao,et al.  Quantum cryptography with imperfect apparatus , 1998, Proceedings 39th Annual Symposium on Foundations of Computer Science (Cat. No.98CB36280).

[35]  M. Bourennane,et al.  Experiments on long wavelength (1550 nm) "plug and play" quantum cryptography systems. , 1999, Optics express.

[36]  N. Lütkenhaus Security against individual attacks for realistic quantum key distribution , 2000 .

[37]  Gilles Brassard,et al.  Experimental Quantum Cryptography , 1990, EUROCRYPT.

[38]  H. Lo,et al.  Practical Decoy State for Quantum Key Distribution , 2005, quant-ph/0503005.