Skip to main content
Log in

Unconditional security of practical quantum key distribution

  • Highlight Paper
  • Published:
The European Physical Journal D Aims and scope Submit manuscript

Abstract.

We present a complete protocol for BB84 quantum key distribution for a realistic setting (noise, loss, multi-photon signals of the source) that covers many of todays experimental implementations. The security of this protocol is shown against an eavesdropper having unrestricted power to manipulate the signals coherently on their path from sender to receiver. The protocol and the security proof take into account the effects concerning the finite size of the generated key. This paper is identical to the preprint arXiv:quant-ph/0107017, which was finalized in 2001. Therefore, some of the more recent developments, including the question of composability, are not addressed.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  • H. Inamori, N. Lütkenhaus, D. Mayers, Inconditional Security for Practical Quantum Key Distribution, arXiv:quant-ph/0107017 (2001)

  • D. Mayers, Quantum key distribution and string oblivious transfer in noisy channels, In Advances in Cryptology  —  Proceedings of Crypto '96; available as arXiv:quant-ph/9606003 (Springer, Berlin, 1996), pp. 343–357

  • D. Mayers, Unconditional security in quantum cryptography, J. ACM (2001) (to appear); also available at arXiv:quant-ph/9802025

  • B. Huttner, N. Imoto, N. Gisin, T. Mor, Phys. Rev. A 51, 1863 (1995)

    Article  ADS  Google Scholar 

  • H.P. Yuen, Quantum Semiclassic. Opt. 8, 939 (1996)

    Article  ADS  Google Scholar 

  • G. Brassard, N. Lütkenhaus, T. Mor, B. Sanders, Phys. Rev. Lett. 85, 1330 (2000)

    Article  ADS  Google Scholar 

  • N. Lütkenhaus, Phys. Rev. A 61, 052304 (2000)

    Article  ADS  Google Scholar 

  • E. Biham, M. Boyer, P.O. Boykin, T. Mor, V. Roychowdhury, A proof of the security of quantum key distribution, arXiv:quant-ph/9912053 (1999)

  • P.W. Shor, J. Preskill, Phys. Rev. Lett. 85, 441 (2000)

    Article  ADS  Google Scholar 

  • B. Huttner, A. Ekert, J. Mod. Opt. 41, 2455 (1994); C. Fuchs, N. Gisin, R. Griffiths, C.-S. Niu, A. Peres, Phys. Rev. A 56, 1163 (1997); B. Slutsky, R. Rao, P. Sun, Y. Fainman, Phys. Rev. A 57, 2383 (1998); N. Lütkenhaus, Phys. Rev. A 59, 3301 (1999)

    ADS  MathSciNet  Google Scholar 

  • J. Cirac, N. Gisin, Phys. Lett. A 229, 1 (1997); H. Bechmann-Pasquinucci, N. Gisin, Phys. Rev. A 59, 4238 (1999)

    Article  MATH  ADS  MathSciNet  Google Scholar 

  • E. Biham, T. Mor, Phys. Rev. Lett. 78, 2256 (1997); E. Biham, M. Boyer, G. Brassard, J. van de Graaf, T. Mor, arXiv:quant-ph/9801022 (1998)

    Article  ADS  Google Scholar 

  • H.-K. Lo, H.F. Chau. Science 283, 2050 (1999)

    ADS  Google Scholar 

  • D. Mayers, A. Yao, arXiv:quant-ph/9809039 (1998); D. Mayers, C. Tourenne, “Violation of Locality and Self-Checking Source”, to appear in: Proceedings of Quantum Communication, Computing, and Measurement 3, held in Capri 2000 (Kluwer Academic/Plenum Publishers)

  • C. Shannon, Bell Syst. Technical Jour. 28, 657 (1949)

    Google Scholar 

  • D. Welsh, Code and Cryptography (Clarendon Press, Oxford, 1988)

  • D. Stinson, Cryptography: Theory and Practice (CRC Press, 1995)

  • C.H. Bennett, G. Brassard, Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, December 1984, pp. 175–179

  • C.H. Bennett, F. Bessette, G. Brassard, L. Salvail, J. Smolin. J. Cryptology 5, 3 (1992)

    MATH  Google Scholar 

  • D.F. Walls, G.J. Milburn, Quantum Optics (Springer, Berlin, 1994)

  • M. Bourennane, F. Gibson, A. Karlsson, A. Hening, P. Jonsson, T. Tsegaye, D. Ljunggren, E. Sundberg, Opt. Expr. 4, 383 (1999)

    Article  ADS  Google Scholar 

  • C. Marand, P.T. Townsend, Opt. Lett. 20, 1695 (1995)

    Article  ADS  Google Scholar 

  • P.D. Townsend, IEEE Photon. Technol. Lett. 10, 1048 (1998)

    Article  ADS  Google Scholar 

  • A. Peres, Quantum Theory: Concepts and Methods (Kluwer, Dordrecht, 1993)

  • Lectures on Communication Theory by D. Welsh, C. McDiarmid, Mathematical Institute, Oxford (1998)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to N. Lütkenhaus.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Inamori, H., Lütkenhaus, N. & Mayers, D. Unconditional security of practical quantum key distribution. Eur. Phys. J. D 41, 599–627 (2007). https://doi.org/10.1140/epjd/e2007-00010-4

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1140/epjd/e2007-00010-4

PACS.

QICS

Navigation