Abstract.
We present a complete protocol for BB84 quantum key distribution for a realistic setting (noise, loss, multi-photon signals of the source) that covers many of todays experimental implementations. The security of this protocol is shown against an eavesdropper having unrestricted power to manipulate the signals coherently on their path from sender to receiver. The protocol and the security proof take into account the effects concerning the finite size of the generated key. This paper is identical to the preprint arXiv:quant-ph/0107017, which was finalized in 2001. Therefore, some of the more recent developments, including the question of composability, are not addressed.
Similar content being viewed by others
References
H. Inamori, N. Lütkenhaus, D. Mayers, Inconditional Security for Practical Quantum Key Distribution, arXiv:quant-ph/0107017 (2001)
D. Mayers, Quantum key distribution and string oblivious transfer in noisy channels, In Advances in Cryptology — Proceedings of Crypto '96; available as arXiv:quant-ph/9606003 (Springer, Berlin, 1996), pp. 343–357
D. Mayers, Unconditional security in quantum cryptography, J. ACM (2001) (to appear); also available at arXiv:quant-ph/9802025
B. Huttner, N. Imoto, N. Gisin, T. Mor, Phys. Rev. A 51, 1863 (1995)
H.P. Yuen, Quantum Semiclassic. Opt. 8, 939 (1996)
G. Brassard, N. Lütkenhaus, T. Mor, B. Sanders, Phys. Rev. Lett. 85, 1330 (2000)
N. Lütkenhaus, Phys. Rev. A 61, 052304 (2000)
E. Biham, M. Boyer, P.O. Boykin, T. Mor, V. Roychowdhury, A proof of the security of quantum key distribution, arXiv:quant-ph/9912053 (1999)
P.W. Shor, J. Preskill, Phys. Rev. Lett. 85, 441 (2000)
B. Huttner, A. Ekert, J. Mod. Opt. 41, 2455 (1994); C. Fuchs, N. Gisin, R. Griffiths, C.-S. Niu, A. Peres, Phys. Rev. A 56, 1163 (1997); B. Slutsky, R. Rao, P. Sun, Y. Fainman, Phys. Rev. A 57, 2383 (1998); N. Lütkenhaus, Phys. Rev. A 59, 3301 (1999)
J. Cirac, N. Gisin, Phys. Lett. A 229, 1 (1997); H. Bechmann-Pasquinucci, N. Gisin, Phys. Rev. A 59, 4238 (1999)
E. Biham, T. Mor, Phys. Rev. Lett. 78, 2256 (1997); E. Biham, M. Boyer, G. Brassard, J. van de Graaf, T. Mor, arXiv:quant-ph/9801022 (1998)
H.-K. Lo, H.F. Chau. Science 283, 2050 (1999)
D. Mayers, A. Yao, arXiv:quant-ph/9809039 (1998); D. Mayers, C. Tourenne, “Violation of Locality and Self-Checking Source”, to appear in: Proceedings of Quantum Communication, Computing, and Measurement 3, held in Capri 2000 (Kluwer Academic/Plenum Publishers)
C. Shannon, Bell Syst. Technical Jour. 28, 657 (1949)
D. Welsh, Code and Cryptography (Clarendon Press, Oxford, 1988)
D. Stinson, Cryptography: Theory and Practice (CRC Press, 1995)
C.H. Bennett, G. Brassard, Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, December 1984, pp. 175–179
C.H. Bennett, F. Bessette, G. Brassard, L. Salvail, J. Smolin. J. Cryptology 5, 3 (1992)
D.F. Walls, G.J. Milburn, Quantum Optics (Springer, Berlin, 1994)
M. Bourennane, F. Gibson, A. Karlsson, A. Hening, P. Jonsson, T. Tsegaye, D. Ljunggren, E. Sundberg, Opt. Expr. 4, 383 (1999)
C. Marand, P.T. Townsend, Opt. Lett. 20, 1695 (1995)
P.D. Townsend, IEEE Photon. Technol. Lett. 10, 1048 (1998)
A. Peres, Quantum Theory: Concepts and Methods (Kluwer, Dordrecht, 1993)
Lectures on Communication Theory by D. Welsh, C. McDiarmid, Mathematical Institute, Oxford (1998)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Inamori, H., Lütkenhaus, N. & Mayers, D. Unconditional security of practical quantum key distribution. Eur. Phys. J. D 41, 599–627 (2007). https://doi.org/10.1140/epjd/e2007-00010-4
Received:
Published:
Issue Date:
DOI: https://doi.org/10.1140/epjd/e2007-00010-4