메뉴 건너뛰기




Volumn 7, Issue 7, 2007, Pages 665-688

Sequential attacks against differential-phase-shift quantum key distribution with weak coherent states

Author keywords

Differential phase shift quantum key distribution; Intercept resend attack; Quantum cryptography; Quantum key distribution; Security; Sequential attack

Indexed keywords

COHERENT LIGHT; QUANTUM THEORY;

EID: 34547512551     PISSN: 15337146     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (47)

References (60)
  • 2
    • 34547494794 scopus 로고    scopus 로고
    • M. Dušek, N. Lütkenhaus, M. Hendrych, Quantum cryptography, to appear in Progress in Optics 49, Edt. E. Wolf (Elsevier).
    • M. Dušek, N. Lütkenhaus, M. Hendrych, Quantum cryptography, to appear in Progress in Optics 49, Edt. E. Wolf (Elsevier).
  • 3
    • 0000478763 scopus 로고
    • Cipher printing telegraph systems
    • G. S. Vernam (1926), Cipher printing telegraph systems, Trans. of the AIEE 45, pp. 295.
    • (1926) Trans. of the AIEE , vol.45 , pp. 295
    • Vernam, G.S.1
  • 5
    • 3042730516 scopus 로고    scopus 로고
    • Unconditional security in quantum cryptography
    • D. Mayers (2001), Unconditional security in quantum cryptography, J. of ACM 48, pp. 351.
    • (2001) J. of ACM , vol.48 , pp. 351
    • Mayers, D.1
  • 6
    • 0033605546 scopus 로고    scopus 로고
    • Unconditional security of quantum key distribution over arbitrarily long distances
    • H.-K. Lo and H. F. Chau (1999), Unconditional security of quantum key distribution over arbitrarily long distances, Science 283, pp. 2050.
    • (1999) Science , vol.283 , pp. 2050
    • Lo, H.-K.1    Chau, H.F.2
  • 8
    • 0347090658 scopus 로고    scopus 로고
    • Simple proof of security of the BB84 quantum key distribution protocol
    • P. W. Shor and J. Preskill (2000), Simple proof of security of the BB84 quantum key distribution protocol, Phys. Rev. Lett. 85, pp. 441.
    • (2000) Phys. Rev. Lett , vol.85 , pp. 441
    • Shor, P.W.1    Preskill, J.2
  • 10
    • 0029357908 scopus 로고
    • Quantum key distribution over distances as long as 30 km
    • C. Marand and P. D. Townsend (1995), Quantum key distribution over distances as long as 30 km, Opt. Lett. 20, pp. 1695.
    • (1995) Opt. Lett , vol.20 , pp. 1695
    • Marand, C.1    Townsend, P.D.2
  • 12
    • 0010758769 scopus 로고    scopus 로고
    • Practical free-space quantum key distribution over 10 km in daylight and at night
    • R. J. Hughes, J. E. Nordholt, D. Derkacs and C. G. Peterson (2002), Practical free-space quantum key distribution over 10 km in daylight and at night, New J. Phys. 4, pp. 43.
    • (2002) New J. Phys , vol.4 , pp. 43
    • Hughes, R.J.1    Nordholt, J.E.2    Derkacs, D.3    Peterson, C.G.4
  • 14
    • 2942611260 scopus 로고    scopus 로고
    • Quantum key distribution over 122 km of standard telecom fiber
    • C Gobby, Z. L. Yuan, and A. J. Shields (2004), Quantum key distribution over 122 km of standard telecom fiber, Appl. Phys. Lett. 84, pp. 3762.
    • (2004) Appl. Phys. Lett , vol.84 , pp. 3762
    • Gobby, C.1    Yuan, Z.L.2    Shields, A.J.3
  • 15
    • 11144327171 scopus 로고    scopus 로고
    • Unconditionally secure quantum key distribution over 50 km of standard telecom fibre
    • C. Gobby, Z. L. Yuan, and A. J. Shields (2004), Unconditionally secure quantum key distribution over 50 km of standard telecom fibre, Electron. Lett. 40, pp. 1603.
    • (2004) Electron. Lett , vol.40 , pp. 1603
    • Gobby, C.1    Yuan, Z.L.2    Shields, A.J.3
  • 16
    • 0000600063 scopus 로고
    • Quantum cryptography with coherent states
    • B. Huttner, N. Imoto, N. Gisin and T. Mor (1995), Quantum cryptography with coherent states, Phys. Rev. A 51, pp. 1863.
    • (1995) Phys. Rev. A , vol.51 , pp. 1863
    • Huttner, B.1    Imoto, N.2    Gisin, N.3    Mor, T.4
  • 20
    • 0041415963 scopus 로고    scopus 로고
    • Quantum Key Distribution with High Loss: Toward Global Secure Communication
    • W.-Y. Hwang (2003), Quantum Key Distribution with High Loss: Toward Global Secure Communication, Phys. Rev. Lett. 91, pp. 057901.
    • (2003) Phys. Rev. Lett , vol.91 , pp. 057901
    • Hwang, W.-Y.1
  • 21
    • 27744479495 scopus 로고    scopus 로고
    • Decoy state quantum key distribution
    • H.-K. Lo, X. Ma, K. Chen (2005), Decoy state quantum key distribution, Phys. Rev. Lett. 94, pp. 230504.
    • (2005) Phys. Rev. Lett , vol.94 , pp. 230504
    • Lo, H.-K.1    Ma, X.2    Chen, K.3
  • 22
    • 27744568650 scopus 로고    scopus 로고
    • Beating the Photon-Number-Splitting Attack in Practical Quantum Cryptography
    • X.-B. Wang (2005), Beating the Photon-Number-Splitting Attack in Practical Quantum Cryptography, Phys. Rev. Lett. 94, pp. 230503.
    • (2005) Phys. Rev. Lett , vol.94 , pp. 230503
    • Wang, X.-B.1
  • 23
    • 27144453296 scopus 로고    scopus 로고
    • Practical decoy state for quantum key distribution
    • X. Ma, B. Qi, Y. Zhao, and H.-K. Lo (2005), Practical decoy state for quantum key distribution, Phys. Rev. A. 72, pp. 012326.
    • (2005) Phys. Rev. A , vol.72 , pp. 012326
    • Ma, X.1    Qi, B.2    Zhao, Y.3    Lo, H.-K.4
  • 24
    • 27144532069 scopus 로고    scopus 로고
    • Decoy-state protocol for quantum cryptography with four different intensities of coherent light
    • X.-B. Wang (2005), Decoy-state protocol for quantum cryptography with four different intensities of coherent light, Phys. Rev. A 72, pp. 012322.
    • (2005) Phys. Rev. A , vol.72 , pp. 012322
    • Wang, X.-B.1
  • 25
    • 27144532069 scopus 로고    scopus 로고
    • X.-B. Wang (2005), Erratum: Decoy-state protocol for quantum cryptography with four different intensities of coherent light [Phys. Rev. A 72, 012322 (2005)], Phys. Rev. A 72, pp. 049908.
    • X.-B. Wang (2005), Erratum: Decoy-state protocol for quantum cryptography with four different intensities of coherent light [Phys. Rev. A 72, 012322 (2005)], Phys. Rev. A 72, pp. 049908.
  • 27
    • 33748998157 scopus 로고    scopus 로고
    • Decoy-state quantum key distribution with two-way classical postprocessing
    • X. Ma, C.-H. F. Fung, F. Dupuis, K. Chen, K. Tamaki, and H.-K. Lo (2006), Decoy-state quantum key distribution with two-way classical postprocessing, Phys. Rev. A 74, pp. 032330.
    • (2006) Phys. Rev. A , vol.74 , pp. 032330
    • Ma, X.1    Fung, C.-H.F.2    Dupuis, F.3    Chen, K.4    Tamaki, K.5    Lo, H.-K.6
  • 28
    • 33344454530 scopus 로고    scopus 로고
    • Experimental Quantum Key Distribution with Decoy States
    • Y. Zhao, B. Qi, X. Ma, H.-K. Lo, and L. Qian (2006), Experimental Quantum Key Distribution with Decoy States, Phys. Rev. Lett. 96, pp. 070502.
    • (2006) Phys. Rev. Lett , vol.96 , pp. 070502
    • Zhao, Y.1    Qi, B.2    Ma, X.3    Lo, H.-K.4    Qian, L.5
  • 33
    • 33846057430 scopus 로고    scopus 로고
    • Unconditionally secure one-way quantum key distribution using decoy pulses
    • Z. L. Yuan, A. W. Sharpe, A. J. Shields (2007), Unconditionally secure one-way quantum key distribution using decoy pulses, Appl. Phys. Lett. 90, pp. 011118.
    • (2007) Appl. Phys. Lett , vol.90 , pp. 011118
    • Yuan, Z.L.1    Sharpe, A.W.2    Shields, A.J.3
  • 34
    • 11944254075 scopus 로고
    • Quantum cryptography using any two nonorthogonal states
    • C. H. Bennett (1992), Quantum cryptography using any two nonorthogonal states, Phys. Rev. Lett. 68, pp. 3121.
    • (1992) Phys. Rev. Lett , vol.68 , pp. 3121
    • Bennett, C.H.1
  • 35
    • 19644377760 scopus 로고    scopus 로고
    • Unconditional security of coherent-state quantum key distribution with a strong phase-reference pulse
    • M. Koashi (2004), Unconditional security of coherent-state quantum key distribution with a strong phase-reference pulse, Phys. Rev. Lett. 93, pp. 120501.
    • (2004) Phys. Rev. Lett , vol.93 , pp. 120501
    • Koashi, M.1
  • 36
    • 34547516163 scopus 로고    scopus 로고
    • Unconditional security of the Bennett 1992 quantum key-distribution scheme with strong reference pulse
    • quantph/0607082
    • K. Tamaki, N. Lütkenhaus, M. Koashi, and J. Batuwantudawe (2006), Unconditional security of the Bennett 1992 quantum key-distribution scheme with strong reference pulse, quantph/0607082.
    • (2006)
    • Tamaki, K.1    Lütkenhaus, N.2    Koashi, M.3    Batuwantudawe, J.4
  • 37
    • 0037101027 scopus 로고    scopus 로고
    • Differential Phase Shift Quantum Key Distribution
    • K. Inoue, E. Waks, and Y. Yamamoto (2002), Differential Phase Shift Quantum Key Distribution, Phys. Rev. Lett. 89, pp. 037902.
    • (2002) Phys. Rev. Lett , vol.89 , pp. 037902
    • Inoue, K.1    Waks, E.2    Yamamoto, Y.3
  • 38
    • 0142025187 scopus 로고    scopus 로고
    • Differential-phase-shift quantum key distribution using coherent light
    • K. Inoue, E. Waks, and Y. Yamamoto (2003), Differential-phase-shift quantum key distribution using coherent light, Phys. Rev. A 68, pp. 022317.
    • (2003) Phys. Rev. A , vol.68 , pp. 022317
    • Inoue, K.1    Waks, E.2    Yamamoto, Y.3
  • 39
    • 33144478746 scopus 로고    scopus 로고
    • Security of differential-phase-shift quantum key distribution against individual attacks
    • E. Waks, H. Takesue, and Y. Yamamoto (2006), Security of differential-phase-shift quantum key distribution against individual attacks, Phys. Rev. A 73, pp. 012344.
    • (2006) Phys. Rev. A , vol.73 , pp. 012344
    • Waks, E.1    Takesue, H.2    Yamamoto, Y.3
  • 41
    • 33845749064 scopus 로고    scopus 로고
    • 100 km differential phase shift quantum key distribution experiment with low jitter up-conversion detectors
    • E. Diamanti, H. Takesue, C. Langrock, M. M. Fejer, and Y. Yamamoto (2006), 100 km differential phase shift quantum key distribution experiment with low jitter up-conversion detectors, Opt. Express 14, pp. 13073.
    • (2006) Opt. Express , vol.14 , pp. 13073
    • Diamanti, E.1    Takesue, H.2    Langrock, C.3    Fejer, M.M.4    Yamamoto, Y.5
  • 42
    • 0342844378 scopus 로고    scopus 로고
    • Unambiguous state discrimination in quantum cryptography with weak coherent states
    • M. Dulek, M. Jahma, and N. Lütkenhaus (2000), Unambiguous state discrimination in quantum cryptography with weak coherent states, Phys. Rev. A 62, pp. 022306.
    • (2000) Phys. Rev. A , vol.62 , pp. 022306
    • Dulek, M.1    Jahma, M.2    Lütkenhaus, N.3
  • 43
    • 0035841898 scopus 로고    scopus 로고
    • Faint laser quantum key distribution: Eavesdropping exploiting multiphoton pulses
    • S. Félix, N. Gisin, A. Stefanov and H. Zbinden (2001), Faint laser quantum key distribution: eavesdropping exploiting multiphoton pulses, J. Mod. Opt. 48, pp. 2009.
    • (2001) J. Mod. Opt , vol.48 , pp. 2009
    • Félix, S.1    Gisin, N.2    Stefanov, A.3    Zbinden, H.4
  • 44
    • 26944440391 scopus 로고    scopus 로고
    • Intercept-resend attacks in the Bennett-Brassard 1984 quantum key distribution protocol with weak coherent pulses
    • M. Curty, and N. Lütkenhaus (2005), Intercept-resend attacks in the Bennett-Brassard 1984 quantum key distribution protocol with weak coherent pulses, Phys. Rev. A 71, pp. 062301.
    • (2005) Phys. Rev. A , vol.71 , pp. 062301
    • Curty, M.1    Lütkenhaus, N.2
  • 45
    • 3142519923 scopus 로고    scopus 로고
    • Entanglement as a precondition for secure quantum key distribution
    • M. Curty, M. Lewenstein, and N. Lütkenhaus (2004), Entanglement as a precondition for secure quantum key distribution, Phys. Rev. Lett. 92, pp. 217903.
    • (2004) Phys. Rev. Lett , vol.92 , pp. 217903
    • Curty, M.1    Lewenstein, M.2    Lütkenhaus, N.3
  • 46
    • 33344457494 scopus 로고    scopus 로고
    • Detecting two-party correlations in quantum key distribution protocols
    • M. Curty, O. Gühne, M. Lewenstein, and N. Lütkenhaus (2005), Detecting two-party correlations in quantum key distribution protocols, Phys. Rev. A 71, pp. 022306.
    • (2005) Phys. Rev. A , vol.71 , pp. 022306
    • Curty, M.1    Gühne, O.2    Lewenstein, M.3    Lütkenhaus, N.4
  • 47
    • 0000643186 scopus 로고
    • How to differentiate between non-orthogonal states
    • I. D. Ivanovic (1987), How to differentiate between non-orthogonal states, Phys. Lett. A 123, pp. 257.
    • (1987) Phys. Lett. A , vol.123 , pp. 257
    • Ivanovic, I.D.1
  • 48
    • 0000691940 scopus 로고
    • Overlap and distinguishability of quantum states
    • D. Dieks (1988), Overlap and distinguishability of quantum states, Phys. Lett. A 126, pp. 303.
    • (1988) Phys. Lett. A , vol.126 , pp. 303
    • Dieks, D.1
  • 49
    • 0002027240 scopus 로고
    • How to differentiate between non-orthogonal states
    • A. Peres (1988), How to differentiate between non-orthogonal states, Phys. Lett. A 128, pp. 19.
    • (1988) Phys. Lett. A , vol.128 , pp. 19
    • Peres, A.1
  • 50
    • 0002326347 scopus 로고
    • Optimal distinction between two non-orthogonal quantum states
    • G. Jaeger, and A. Shimony (1995), Optimal distinction between two non-orthogonal quantum states, Phys. Lett. A 197, pp. 83.
    • (1995) Phys. Lett. A , vol.197 , pp. 83
    • Jaeger, G.1    Shimony, A.2
  • 51
    • 0347417034 scopus 로고    scopus 로고
    • Optimum unambiguous discrimination between linearly independent symmetric states
    • A. Chefies, and S. M. Barnett (1998), Optimum unambiguous discrimination between linearly independent symmetric states, Phys. Lett. A 250, pp. 223.
    • (1998) Phys. Lett. A , vol.250 , pp. 223
    • Chefies, A.1    Barnett, S.M.2
  • 53
    • 0034310204 scopus 로고    scopus 로고
    • Quantum state discrimination
    • A. Chefles (2000), Quantum state discrimination, Contemporary Phys. 41, pp. 401.
    • (2000) Contemporary Phys , vol.41 , pp. 401
    • Chefles, A.1
  • 55
    • 0141816571 scopus 로고    scopus 로고
    • Qubit entanglement breaking channels
    • M. B. Ruskai (2003), Qubit entanglement breaking channels, Rev. Math. Phys. 15, pp. 643.
    • (2003) Rev. Math. Phys , vol.15 , pp. 643
    • Ruskai, M.B.1
  • 58
    • 34547535907 scopus 로고    scopus 로고
    • Zero-Error Attacks and Detection Statistics in the Coherent One-Way Protocol for Quantum Cryptography
    • C Branciard, N. Gisin, N. Liitkenhaus, and V. Scarani (2007), Zero-Error Attacks and Detection Statistics in the Coherent One-Way Protocol for Quantum Cryptography, Quant. Inf. Comp. 7, pp. 639.
    • (2007) Quant. Inf. Comp , vol.7 , pp. 639
    • Branciard, C.1    Gisin, N.2    Liitkenhaus, N.3    Scarani, V.4
  • 59
    • 0342656182 scopus 로고    scopus 로고
    • Quantum key distribution: Theory for application
    • N. Lütkenhaus (1999), Quantum key distribution: theory for application, Applied Phys. B 69, pp. 395.
    • (1999) Applied Phys. B , vol.69 , pp. 395
    • Lütkenhaus, N.1
  • 60
    • 0003233008 scopus 로고
    • States, Effects, and Operations
    • in, A. Böhm, J. D. Dollard and W. Wootters eds, Springer, Berlin
    • K. Kraus (1983), in States, Effects, and Operations, No. 190 in Lecture Notes in Physics, A. Böhm, J. D. Dollard and W. Wootters eds., Springer, Berlin.
    • (1983) Lecture Notes in Physics , vol.190
    • Kraus, K.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.