# The security of practical quantum key distribution

@article{Scarani2009TheSO, title={The security of practical quantum key distribution}, author={Valerio Scarani and H. Bechmann-Pasquinucci and Nicolas J. Cerf and Miloslav Du{\vs}ek and Norbert Lutkenhaus and Momtchil Peev}, journal={Reviews of Modern Physics}, year={2009}, volume={81}, pages={1301-1350} }

Quantum key distribution (QKD) is the first quantum information task to reach the level of mature technology, already fit for commercialization. It aims at the creation of a secret key between authorized partners connected by a quantum channel and a classical authenticated channel. The security of the key can in principle be guaranteed without putting any restriction on an eavesdropper's power. This article provides a concise up-to-date review of QKD, biased toward the practical side. Essential… Expand

#### Figures and Tables from this paper

#### Paper Mentions

#### 2,036 Citations

A Survey of Quantum Key Distribution (QKD) Technologies

- Engineering
- 2014

Quantum Key Distribution (QKD) is a revolutionary security technology that exploits the laws of quantum mechanics to achieve information-theoretic secure key exchange. QKD enables two parties to… Expand

Quantum Flows for Secret Key Distribution

- Computer Science
- 2018

A new theoretical approach called quantum flows is proposed to be able to detect the eavesdropping activity in the channel without requiring additional optical components different from the BB84 protocol because the system can be implemented as a high software module. Expand

Security of the decoy state method for quantum key distribution

- Physics, Computer Science
- 2021

The decoy state method is devoted to, a countermeasure against vulnerabilities caused by the use of coherent states of light for QKD protocols whose security is proved under the assumption of single-photon states. Expand

A Tutorial on Quantum Key Distribution

- Computer Science
- 2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA)
- 2015

High-speed, long-distance and multi-access QKD technologies and security patches against quantum hacking are both continuously research tendency of QKKD in the future. Expand

Recent Advances on Quantum Key Distribution Overcoming the Linear Secret Key Capacity Bound

- Physics, Computer Science
- 2020

An up-to-date survey on recent developments in quantum key distribution, including the security proofs of phase-matching QKD and other TF-QKD type protocols, the theoretical examinations of these protocols under realistic conditions, and the recent experimental demonstrations are presented. Expand

Quantum key distribution protocol with pseudorandom bases

- Physics, Computer Science
- ArXiv
- 2017

This work considers a novel class of prepare-and-measure QKD protocols, utilizing additional pseudorandomness in the preparation of quantum states, and demonstrates that, for single-photon sources, the considered protocol gives better secret key rates than the BB84 and the asymmetric BB84 protocol. Expand

Measurement-Device-Independent Quantum Cryptography

- Physics
- IEEE Journal of Selected Topics in Quantum Electronics
- 2015

In theory, quantum key distribution (QKD) provides information-theoretic security based on the laws of physics. Owing to the imperfections of real-life implementations, however, there is a big gap… Expand

Towards the unconditional security proof for the Coherent-One-Way protocol

- 2011

Quantum Cryptography, one aspect of which is Quantum Key Distribution, provides the only physically secure and proven method for the transmission of a secret key between two distant parties, Alice… Expand

Authenticated multi-user quantum key distribution with single particles

- Computer Science
- 2016

An efficient authenticated multi-user quantum key distribution protocol with single particles that any two users on a quantum network can perform mutual authentication and share a secure session key with the assistance of a semi-honest center is proposed. Expand

Full-field implementation of a perfect eavesdropper on a quantum cryptography system.

- Computer Science, Physics
- Nature communications
- 2011

It is shown that non-idealities in physical implementations of QKD can be fully practically exploitable, and must be given increased scrutiny if quantum cryptography is to become highly secure. Expand

#### References

SHOWING 1-10 OF 648 REFERENCES

Unconditional security of practical quantum key distribution

- Computer Science, Physics
- 2007

This paper is identical to the preprint arXiv:quant-ph/0107017, which was finalized in 2001, therefore, some of the more recent developments, including the question of composability, are not addressed. Expand

Decoy state quantum key distribution.

- Computer Science, Medicine
- Physical review letters
- 2005

The method is to use decoy states to detect eavesdropping attacks and has the best of both worlds--enjoying unconditional security guaranteed by the fundamental laws of physics and yet dramatically surpassing some of the best experimental performances reported in the literature. Expand

Practical evaluation of security for quantum key distribution

- Physics
- 2006

Many papers have proven the security of quantum key distribution (QKD) systems in the asymptotic framework. The degree of the security has not been discussed in the finite coding-length framework,… Expand

Experimental quantum key distribution with decoy states.

- Computer Science, Physics
- Physical review letters
- 2006

By making simple modifications to a commercial quantum key distribution system, it is shown that a secure key generation rate of 165 bit/s, which is 1/4 of the theoretical limit, can be obtained over 15 km of a telecommunication fiber. Expand

Architecture and protocols of the future European quantum key distribution network

- Computer Science
- Secur. Commun. Networks
- 2008

The important aspects of the architecture and the network layer protocols of the SeCoQC QKD network are discussed, which will be demonstrated in September 2008. Expand

Reconciliation of a quantum-distributed Gaussian key

- Mathematics, Computer Science
- IEEE Transactions on Information Theory
- 2004

A novel construction is presented that allows the legitimate parties to get equal bit strings out of correlated variables by using a classical channel, with as little leaked information as possible, which opens the way to securely correcting nonbinary key elements. Expand

Quantum Key Distribution Based on Private States: Unconditional Security Over Untrusted Channels With Zero Quantum Capacity

- Computer Science, Physics
- IEEE Transactions on Information Theory
- 2008

This paper proves unconditional security for a quantum key distribution protocol based on distilling pbits (twisted ebits) from an arbitrary untrusted state that is claimed to contain distillable key using only public communication-via parameter estimation of the given untr trusted state. Expand

Continuous variable quantum cryptography using coherent states.

- Physics, Medicine
- Physical review letters
- 2002

We propose several methods for quantum key distribution (QKD) based on the generation and transmission of random distributions of coherent or squeezed states, and we show that they are secure against… Expand

Secure quantum key distribution using squeezed states

- Physics
- 2001

We prove the security of a quantum key distribution scheme based on transmission of squeezed quantum states of a harmonic oscillator. Our proof employs quantum error-correcting codes that encode a… Expand

Practical long-distance quantum key distribution system using decoy levels

- Physics
- 2009

Quantum key distribution (QKD) has the potential for widespread real-world applications, but no secure long-distance experiment has demonstrated the truly practical operation needed to move QKD from… Expand