Skip to main content

Security of Quantum Cryptography

  • Conference paper
  • First Online:
Book cover Security in Computing and Communications (SSCC 2019)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1208))

Included in the following conference series:

  • 623 Accesses

Abstract

Quantum cryptography is one of the most mature area of quantum information. In the past few decades, active research has taken place in theoretical as well as implementation security of a practical quantum key distribution system. This resulted in hardening of theoretical proofs for a robust implementation against implementation loopholes and realistic attacks on QKD system. Particularly, many hacking strategies on the source, link, and detection system have been demonstrated. This paved way to the development of robust engineering of QKD system. The emphasis of this paper is twofold, we bring forth the newer security techniques paving way for information-theoretic security proofs leading to high QKD performance for market deployment, and discuss the recent quantum hacking on different QKD protocols. This has led to the strengthening of the QKD system and enabled active monitoring against possible eavesdropping activities.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceeding of the IEEE International Conference on Computers, Systems and Signal Processing, pp. 175–179 (1984)

    Google Scholar 

  2. Bennett, C.H., Bessette, F., Brassard, G., Salvail, L., Smolin, J.: Experimental quantum cryptography. J. Cryptol. 5, 3–28 (1992). https://doi.org/10.1007/BF00191318

    Article  MATH  Google Scholar 

  3. Elliott, C., Colvin, A., Pearson, D., Pikalo, O., Schlafer, J., Yeh, H.: Current status of the DARPA quantum network (Invited Paper). In: Quantum Information and Computation III. Proceedings of SPIE, vol. 5815, p. 138 (2005). https://doi.org/10.1117/12.606489

  4. Pan, J.-W.: Quantum science satellite. Chin. J. Space Sci. 34, 547–549 (2014)

    Google Scholar 

  5. Lo, H.-K., Curty, M., Tamaki, K.: Secure quantum key distribution. Nat. Photonics 8, 595 (2014)

    Article  Google Scholar 

  6. Diamanti, E., Lo, H.-K., Yuan, Z.: Practical challenges in quantum key distribution. npj Quant. Inf. 2, 16025 (2016)

    Article  Google Scholar 

  7. Ben-Or, M., Horodecki, M., Leung, D.W., Mayers, D., Oppenheim, J.: The universal composable security of quantum key distribution. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 386–406. Springer, Heidelberg (2005). https://doi.org/10.1007/978-3-540-30576-7_21

    Chapter  MATH  Google Scholar 

  8. Renner, R., König, R.: Universally composable privacy amplification against quantum adversaries. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 407–425. Springer, Heidelberg (2005). https://doi.org/10.1007/978-3-540-30576-7_22

    Chapter  Google Scholar 

  9. Wiesner, S.: Conjugate coding. ACM SIGACT News 15, 78–88 (1983)

    Article  Google Scholar 

  10. Ekert, A.K.: Quantum cryptography based on Bell’s theorem. Phys. Rev. Lett. 67, 661 (1991)

    Article  MathSciNet  Google Scholar 

  11. Lo, H.-K., Chau, H.F.: Unconditional security of quantum key distribution over arbitrarily long distances. Science 283, 2050–2056 (1999)

    Article  Google Scholar 

  12. Shor, P.W., Preskill, J.: Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85, 441 (2000)

    Article  Google Scholar 

  13. Mayer, D.: Unconditional security in quantum cryptography. J. ACM (JACM) 48, 351–406 (2001)

    Article  MathSciNet  Google Scholar 

  14. Koashi, M.: Simple security proof of quantum key distribution based on complementarity. New J. Phys. 11, 045018 (2009)

    Article  MathSciNet  Google Scholar 

  15. Gottesman, D., Lo, H.-K., Lütkenhaus, N., Preskill, J.: Security of quantum key distribution with imperfect devices. Quant. Inf. Comput. 5, 325–360 (2004)

    MathSciNet  MATH  Google Scholar 

  16. Lo, H.-K., Ma, X., Chen, K.: Decoy state quantum key distribution. Phys. Rev. Lett. 94, 230504 (2005)

    Article  Google Scholar 

  17. Tang, Y.-L., et al.: Source attack of decoy-state quantum key distribution using phase information. Phys. Rev. A 88, 022308 (2013)

    Article  Google Scholar 

  18. Jain, N., Stiller, B., Khan, I., Elser, D., Marquardt, C., Leuchs, G.: Attacks on practical quantum key distribution systems (and how to prevent them). Contemp. Phys. 57, 366–387 (2016)

    Article  Google Scholar 

  19. Qi, B., Fung, C.-H.F., Lo, H.-K., Ma, X.: Time shift attack in practical quantum cryptosystems. Quant. Inf. Comput. 7, 73–82 (2007)

    MathSciNet  MATH  Google Scholar 

  20. Lydersen, L., Wiechers, C., Wittmann, C., Elser, D., Skaar, J., Makarov, V.: Hacking commercial quantum cryptography systems by tailored bright illumination. Nat. Photonics 4, 686–689 (2010)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Anindita Banerjee .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Banerjee, A. (2020). Security of Quantum Cryptography. In: Thampi, S., Martinez Perez, G., Ko, R., Rawat, D. (eds) Security in Computing and Communications. SSCC 2019. Communications in Computer and Information Science, vol 1208. Springer, Singapore. https://doi.org/10.1007/978-981-15-4825-3_15

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-4825-3_15

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-4824-6

  • Online ISBN: 978-981-15-4825-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics