Abstract
The use of quantum bits (qubits) in cryptography holds the promise of secure cryptographic quantum key distribution schemes. Unfortunately, the implemented schemes are often operated in a regime which excludes unconditional security. We provide a thorough investigation of security issues for practical quantum key distribution, taking into account channel losses, a realistic detection process, and modifications of the “qubits” sent from the sender to the receiver. We first show that even quantum key distribution with perfect qubits might not be achievable over long distances when fixed channel losses and fixed dark count errors are taken into account. Then we show that existing experimental schemes (based on weak pulses) currently do not offer unconditional security for the reported distances and signal strength. Finally we show that parametric downconversion offers enhanced performance compared to its weak coherent pulse counterpart.
Supported in part by Canada’s Nserc and Québec’s Fcar.
Supported by grant 43336 by the Academy of Finland.
Supported in part by grant #961360 from the Jet Propulsion Laboratory, and grant #530-1415-01 from the DARPA Ultra program.
Chapter PDF
Similar content being viewed by others
References
C.H. Bennett, “Quantum cryptography using any two nonorthogonal states”, Physical Review Letters, Vol. 68, no. 21, 25 May 1992, pp. 3121–3124.
C.H. Bennett, F. Bessette, G. Brassard, L. Salvail and J. Smolin, “Experimental quantum cryptography”, Journal of Cryptology, Vol. 5, no. 1, 1992, pp. 3–28.
C.H. Bennett and G. Brassard, “Quantum cryptography: Public key distribution and coin tossing”, in Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, December 1994, pp. 175–179.
C.H. Bennett, G. Brassard, C. Crépeau and U. M. Maurer, “Generalized privacy amplification”, IEEE Transactions on Information Theory, Vol. IT-41, no. 6, November 1995, pp. 1915–1923.
C.H. Bennett, G. Brassard and A.K. Ekert, “Quantum cryptography”, Scientific American, Vol. 267, no. 4, October 1992, pp. 50–57.
E. Biham, M. Boyer, P.O. Boykin, T. Mor and V. Roychowdhury, “A proof of security of quantum key distribution”, in Proceedings of 32nd ACM Symposium on Theory of Computing, May 2000, to appear.
E. Biham, M. Boyer, G. Brassard, J. van-de-Graaf and T. Mor, “Security of quantum key distribution against all collective attacks”, Los Alamos archives quant-ph/9801022, January 1998.
E. Biham and T. Mor, “Bounds on information and the security of quantum cryptography”, Physical Review Letters, Vol. 79, no. 20, 17 November 1997, pp. 4034–4037.
K. J. Blow, R. Loudon, S. J. D. Phoenix and T. J. Sheperd, “Continuum fields in quantum optics”, Physical Review A, Vol. 42, no. 7, October 1990, pp. 4102–4114.
G. Brassard, T. Mor and B.C. Sanders, “Quantum cryptography via parametric downconversion”, in Quantum Communication, Computing, and Measurement 2, P. Kumar, G. Mauro D’Ariano and O. Hirota (editors), Kluwer Academic/Plenum Publishers, New York, 2000, pp. 381–386.
W. T. Buttler, R. J. Hughes, P. G. Kwiat, G. G. Luther, G. L. Morgan, J.E. Nordholt, C.G. Peterson and C. M. Simmons, “Free-space quantum-key distribution”, Physical Review A, Vol. 57, no. 4, April 1998, pp. 2379–2382.
A.K. Ekert, J. G. Rarity, P.R. Tapster and G.M. Palma, “Practical quantum cryptography based on two-photon interferometry”, Physical Review Letters, Vol. 69, no. 9, 31 August 1992, pp. 1293–1295.
J. D. Franson and H. Ilves, “Quantum cryptography using polarization feedback”, Journal of Modern Optics, Vol. 41, no. 12, December 1994, pp. 2391–2396.
P. Hariharan and B.C. Sanders, “Quantum phenomena in optical interferometry”, Progress in Optics, Vol. XXXVI, 1996, pp. 49–128.
B. Huttner, N. Imoto, N. Gisin and T. Mor, “Quantum cryptography with coherent states”, Physical Review A, Vol. 51, no. 3, March 1995, pp. 1863–1869.
E. T. Jaynes and F.W. Cummings, “Comparison of quantum and semiclassical radiation theories with application to the beam maser”, Proceedings of the IEEE, Vol. 51, 1963, pp. 89–109.
J. Kim, O. Benson, H. Kan and Y. Yamamoto, “A single-photon turnstile device”, Nature, Vol. 397, no. 6719, 1999, pp. 500–503.
N. Lütkenhaus, “Dim coherent states as signal states in the BB84 protocol: Is it secure?”, in Quantum Communication, Computing, and Measurement 2, P. Kumar, G. Mauro D’Ariano and O. Hirota (editors), Kluwer Academic/Plenum Publishers, New York, 2000, pp. 387–392.
N. Lütkenhaus, “Security of quantum cryptography with realistic sources”, Acta Physica Slovaca, Vol. 49, 1999, pp. 549–556.
N. Lütkenhaus, “Security against individual attacks for realistic quantum key distribution”, Los Alamos archives quant-ph/9910093, October 1999.
C. Marand and P. D. Townsend, “Quantum key distribution over distances as long as 30 km”, Optics Letters, Vol. 20, 15 August 1995, pp. 1695–1697.
D. Mayers, “Quantum key distribution and string oblivious transfer in noisy channels”, in Advances in Cryptology: Proceedings of Crypto’96, Lecture Notes in Computer Science, Vol. 1109, Springer-Verlag, August 1996, pp. 343–357.
D. Mayers, “Unconditional security in quantum cryptography”, Los Alamos archives quant-ph/9802025, February 1998.
T. Mor, “Quantum memory in quantum cryptography”, Ph.D. Thesis, Technion, Haifa, 1997; Los Alamos archives quant-ph/9906073.
A. Muller, T. Herzog, B. Huttner, W. Tittel, H. Zbinden and N. Gisin, “Plug and Play systems for quantum cryptography”, Applied Physics Letters, Vol. 70, 1997, pp. 793–795.
K. Mølmer, private communication.
R. L. Rivest, A. Shamir and L. M. Adleman, “A method for obtaining digital signatures and public-key cryptosystems”, Communications of the ACM, Vol. 21, no. 2, 1978, pp. 120–126.
A.V. Sergienko, M. Atatüre, Z. Walton, G. Jaeger, B. E.A. Saleh and M.C. Teich, “Quantum cryptography using femtosecond-pulsed parametric down-conversion”, Physical Review A, Vol. 60, no. 4, October 1999, pp. R2622–R2625.
P.W. Shor, “Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer”, SIAM Journal on Computing, Vol. 26, no. 5, 1997, pp. 1484–1509.
P. D. Townsend, “Experimental investigation of the performance limits for first telecommunications-window quantum cryptography systems”, IEEE Photonics Technology Letters, Vol. 10, 1998, pp. 1048–1050.
D. F.Walls and G. J. Milburn, Quantum Optics, Springer-Verlag, Heidelberg, 1994.
H.P. Yuen, “Quantum amplifiers, quantum duplicators and quantum cryptography”, Quantum and Semiclassical Optics, Vol. 8, 1996, pp. 939–949.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2000 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Brassard, G., Lütkenhaus, N., Mor, T., Sanders, B.C. (2000). Security Aspects of Practical Quantum Cryptography. In: Preneel, B. (eds) Advances in Cryptology — EUROCRYPT 2000. EUROCRYPT 2000. Lecture Notes in Computer Science, vol 1807. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45539-6_20
Download citation
DOI: https://doi.org/10.1007/3-540-45539-6_20
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-67517-4
Online ISBN: 978-3-540-45539-4
eBook Packages: Springer Book Archive