Upper bounds for the security of two distributed-phase reference protocols of quantum cryptography
Open Access
- 1 January 2008
- journal article
- Published by IOP Publishing in New Journal of Physics
- Vol. 10 (1), 013031
- https://doi.org/10.1088/1367-2630/10/1/013031
Abstract
The differential-phase-shift (DPS) and the coherent-one-way (COW) are among the most practical protocols for quantum cryptography, and are therefore the object of fast-paced experimental developments. The assessment of their security is also a challenge for theorists: the existing tools, that allow to prove security against the most general attacks, do not apply to these two protocols in any straightforward way. We present new upper bounds for their security in the limit of large distances (d50 km with typical values in optical fibers) by considering a large class of collective attacks, namely those in which the adversary attaches ancillary quantum systems to each pulse or to each pair of pulses. We introduce also two modified versions of the COW protocol, which may prove more robust than the original one.Keywords
Other Versions
This publication has 25 references indexed in Scilit:
- Sequential attack with intensity modulation on the differential-phase-shift quantum-key-distribution protocolPhysical Review A, 2007
- Quantum key distribution over a 40-dB channel loss using superconducting single-photon detectorsNature Photonics, 2007
- From quantum cloning to quantum key distribution with continuous variables: a review (Invited)Journal of the Optical Society of America B, 2007
- Security of differential-phase-shift quantum key distribution against individual attacksPhysical Review A, 2006
- Decoy State Quantum Key DistributionPhysical Review Letters, 2005
- Beating the Photon-Number-Splitting Attack in Practical Quantum CryptographyPhysical Review Letters, 2005
- Robustness of differential-phase-shift quantum key distribution against photon-number-splitting attackPhysical Review A, 2005
- Security against individual attacks for realistic quantum key distributionPhysical Review A, 2000
- Quantum cryptography using any two nonorthogonal statesPhysical Review Letters, 1992
- Quantum cryptography based on Bell’s theoremPhysical Review Letters, 1991