Abstract
Quantum cryptography is one of the most mature area of quantum information. In the past few decades, active research has taken place in theoretical as well as implementation security of a practical quantum key distribution system. This resulted in hardening of theoretical proofs for a robust implementation against implementation loopholes and realistic attacks on QKD system. Particularly, many hacking strategies on the source, link, and detection system have been demonstrated. This paved way to the development of robust engineering of QKD system. The emphasis of this paper is twofold, we bring forth the newer security techniques paving way for information-theoretic security proofs leading to high QKD performance for market deployment, and discuss the recent quantum hacking on different QKD protocols. This has led to the strengthening of the QKD system and enabled active monitoring against possible eavesdropping activities.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceeding of the IEEE International Conference on Computers, Systems and Signal Processing, pp. 175–179 (1984)
Bennett, C.H., Bessette, F., Brassard, G., Salvail, L., Smolin, J.: Experimental quantum cryptography. J. Cryptol. 5, 3–28 (1992). https://doi.org/10.1007/BF00191318
Elliott, C., Colvin, A., Pearson, D., Pikalo, O., Schlafer, J., Yeh, H.: Current status of the DARPA quantum network (Invited Paper). In: Quantum Information and Computation III. Proceedings of SPIE, vol. 5815, p. 138 (2005). https://doi.org/10.1117/12.606489
Pan, J.-W.: Quantum science satellite. Chin. J. Space Sci. 34, 547–549 (2014)
Lo, H.-K., Curty, M., Tamaki, K.: Secure quantum key distribution. Nat. Photonics 8, 595 (2014)
Diamanti, E., Lo, H.-K., Yuan, Z.: Practical challenges in quantum key distribution. npj Quant. Inf. 2, 16025 (2016)
Ben-Or, M., Horodecki, M., Leung, D.W., Mayers, D., Oppenheim, J.: The universal composable security of quantum key distribution. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 386–406. Springer, Heidelberg (2005). https://doi.org/10.1007/978-3-540-30576-7_21
Renner, R., König, R.: Universally composable privacy amplification against quantum adversaries. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 407–425. Springer, Heidelberg (2005). https://doi.org/10.1007/978-3-540-30576-7_22
Wiesner, S.: Conjugate coding. ACM SIGACT News 15, 78–88 (1983)
Ekert, A.K.: Quantum cryptography based on Bell’s theorem. Phys. Rev. Lett. 67, 661 (1991)
Lo, H.-K., Chau, H.F.: Unconditional security of quantum key distribution over arbitrarily long distances. Science 283, 2050–2056 (1999)
Shor, P.W., Preskill, J.: Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85, 441 (2000)
Mayer, D.: Unconditional security in quantum cryptography. J. ACM (JACM) 48, 351–406 (2001)
Koashi, M.: Simple security proof of quantum key distribution based on complementarity. New J. Phys. 11, 045018 (2009)
Gottesman, D., Lo, H.-K., Lütkenhaus, N., Preskill, J.: Security of quantum key distribution with imperfect devices. Quant. Inf. Comput. 5, 325–360 (2004)
Lo, H.-K., Ma, X., Chen, K.: Decoy state quantum key distribution. Phys. Rev. Lett. 94, 230504 (2005)
Tang, Y.-L., et al.: Source attack of decoy-state quantum key distribution using phase information. Phys. Rev. A 88, 022308 (2013)
Jain, N., Stiller, B., Khan, I., Elser, D., Marquardt, C., Leuchs, G.: Attacks on practical quantum key distribution systems (and how to prevent them). Contemp. Phys. 57, 366–387 (2016)
Qi, B., Fung, C.-H.F., Lo, H.-K., Ma, X.: Time shift attack in practical quantum cryptosystems. Quant. Inf. Comput. 7, 73–82 (2007)
Lydersen, L., Wiechers, C., Wittmann, C., Elser, D., Skaar, J., Makarov, V.: Hacking commercial quantum cryptography systems by tailored bright illumination. Nat. Photonics 4, 686–689 (2010)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Banerjee, A. (2020). Security of Quantum Cryptography. In: Thampi, S., Martinez Perez, G., Ko, R., Rawat, D. (eds) Security in Computing and Communications. SSCC 2019. Communications in Computer and Information Science, vol 1208. Springer, Singapore. https://doi.org/10.1007/978-981-15-4825-3_15
Download citation
DOI: https://doi.org/10.1007/978-981-15-4825-3_15
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-4824-6
Online ISBN: 978-981-15-4825-3
eBook Packages: Computer ScienceComputer Science (R0)