2000
DOI: 10.1103/physrevlett.85.1330
|View full text |Cite
|
Sign up to set email alerts
|

Limitations on Practical Quantum Cryptography

Abstract: The use of quantum bits (qubits) in cryptography holds the promise of secure cryptographic quantum key distribution schemes. Unfortunately, the implemented schemes can be totally insecure. We provide a thorough investigation of security issues for practical quantum key distribution, taking into account channel losses, a realistic detection process, and modifications of the "qubits" sent from the sender to the receiver. We first show that even quantum key distribution with perfect qubits cannot be achieved over… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

11
952
0
5

Year Published

2007
2007
2023
2023

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 1,110 publications
(968 citation statements)
references
References 18 publications
11
952
0
5
Order By: Relevance
“…The easiest and most straightforward way is to attenuate pulsed lasers [5], though in this case the production of single photons is probabilistic. Therefore, there may be no photons, several photons, or many photons, since the photon number generated is subject to Poissonian statistics; this can be problematic for a number of applications such as quantum cryptography because of possible photon number-splitting attacks ("eavesdropping") [6,7]. Another more practical approach for obtaining single photons is to exploit spontaneous parametric down conversion in nonlinear crystals [8], where higher-frequency pump photons incident on a nonlinear crystal are occasionally split into a pair of lower-frequency photons; one of these photons (the "heralding" photon) is used to herald the arrival of the second photon ("heralded" photon), and thus the second photon can be well isolated and manipulated.…”
Section: Introductionmentioning
confidence: 99%
“…The easiest and most straightforward way is to attenuate pulsed lasers [5], though in this case the production of single photons is probabilistic. Therefore, there may be no photons, several photons, or many photons, since the photon number generated is subject to Poissonian statistics; this can be problematic for a number of applications such as quantum cryptography because of possible photon number-splitting attacks ("eavesdropping") [6,7]. Another more practical approach for obtaining single photons is to exploit spontaneous parametric down conversion in nonlinear crystals [8], where higher-frequency pump photons incident on a nonlinear crystal are occasionally split into a pair of lower-frequency photons; one of these photons (the "heralding" photon) is used to herald the arrival of the second photon ("heralded" photon), and thus the second photon can be well isolated and manipulated.…”
Section: Introductionmentioning
confidence: 99%
“…Instead, weak coherent laser pulses (WCP) with poissonian photon statistics are used. This has security implications since pulses of light containing more than one photon can be exploited by the eavesdropper to learn potentially all the information about the encoded bit, using the so-called photon-number-splitting (PNS) attack [43]. Considering this attack, it remains possible to prove the security of BB84 performed with WCP, but one must decrease the mean number of photons in the pulse (and hence the rate) as the distance increases [43].…”
Section: Practical Security Of Qkd Implementations and Implementationmentioning
confidence: 99%
“…This has security implications since pulses of light containing more than one photon can be exploited by the eavesdropper to learn potentially all the information about the encoded bit, using the so-called photon-number-splitting (PNS) attack [43]. Considering this attack, it remains possible to prove the security of BB84 performed with WCP, but one must decrease the mean number of photons in the pulse (and hence the rate) as the distance increases [43]. In 2003, a more radical response to the PNS attack has been proposed, that consists in modifying the QKD protocol with the adjunction 5.2 Device-independent security: fundamental quantum mechanics as a tool against side-channels of decoy-states to actively test the influence of the eavesdropper on the photon statistics.…”
Section: Practical Security Of Qkd Implementations and Implementationmentioning
confidence: 99%
“…Similarly, in linear optics quantum computing, the successful operation of a quantum logic gate is often heralded by the detection of a photon number state 6 . Low-noise photon number detection would also be useful for characterizing non-classical light sources 7,8 and security analysis in quantum cryptography 9 . In combination with parametric down-conversion sources, photon number detection can also be used for the generation and conditioning of photonic Fock states 10 , as well as more complex quantum light states 11 .…”
mentioning
confidence: 99%