메뉴 건너뛰기




Volumn 10, Issue 1-2, 2010, Pages 60-76

Security of quantum key distribution with bit and basis dependent detector flaws

Author keywords

Detection efficiency mismatch; Quantum cryptography; Quantum key distribution; Security proof

Indexed keywords

QUANTUM EFFICIENCY;

EID: 77953935498     PISSN: 15337146     EISSN: None     Source Type: Journal    
DOI: 10.26421/qic10.1-2-5     Document Type: Article
Times cited : (49)

References (37)
  • 2
    • 0343152990 scopus 로고
    • Quantum cryptography based on bell theorem
    • A. K. Ekert (1991), Quantum cryptography based on bell theorem, Phys. Rev. Lett., Vol. 67, pp. 661-663.
    • (1991) Phys. Rev. Lett , vol.67 , pp. 661-663
    • Ekert, A.K.1
  • 3
    • 11944254075 scopus 로고
    • Quantum cryptography using any 2 nonorthogonal states
    • C. H. Bennett (1992), Quantum cryptography using any 2 nonorthogonal states, Phys. Rev. Lett., Vol. 68, pp. 3121-3124.
    • (1992) Phys. Rev. Lett , vol.68 , pp. 3121-3124
    • Bennett, C.H.1
  • 5
    • 84955621476 scopus 로고    scopus 로고
    • Advances in cryptology
    • N. Koblitz, editor, Springer, New York
    • D. Mayers (1996), Advances in cryptology in N. Koblitz, editor, Proceedings of Crypto'96, Vol. 1109, Springer, New York, pp. 343-357.
    • (1996) Proceedings of Crypto'96 , vol.1109 , pp. 343-357
    • Mayers, D.1
  • 6
    • 3042730516 scopus 로고    scopus 로고
    • Unconditional security in quantum cryptography
    • D. Mayers (2001), Unconditional security in quantum cryptography, J. Assoc. Comp. Mach., Vol. 48, pp. 351-406.
    • (2001) J. Assoc. Comp. Mach , vol.48 , pp. 351-406
    • Mayers, D.1
  • 7
    • 0033605546 scopus 로고    scopus 로고
    • Unconditional security of quantum key distribution over arbitrarily long distances
    • H.-K. Lo and H. F. Chau (1999), Unconditional security of quantum key distribution over arbitrarily long distances, Science, Vol. 283, pp. 2050-2056.
    • (1999) Science , vol.283 , pp. 2050-2056
    • Lo, H.-K.1    Chau, H.F.2
  • 8
    • 0347090658 scopus 로고    scopus 로고
    • Simple proof of security of the BB84 quantum key distribution protocol
    • P. W. Shor and J. Preskill (2000), Simple proof of security of the BB84 quantum key distribution protocol, Phys. Rev. Lett., Vol. 85, pp. 441-444.
    • (2000) Phys. Rev. Lett , vol.85 , pp. 441-444
    • Shor, P.W.1    Preskill, J.2
  • 10
    • 0037422980 scopus 로고    scopus 로고
    • Secure quantum key distribution with an uncharacterized source
    • M. Koashi and J. Preskill (2003), Secure quantum key distribution with an uncharacterized source, Phys. Rev. Lett., Vol. 90, 057902.
    • (2003) Phys. Rev. Lett , vol.90 , pp. 057902
    • Koashi, M.1    Preskill, J.2
  • 11
    • 7044249607 scopus 로고    scopus 로고
    • Security of quantum key distribution with imperfect devices
    • D. Gottesman, H.-K. Lo, N. Lütkenhaus and J. Preskill (2004), Security of quantum key distribution with imperfect devices, Quant. Inf. Comp., Vol. 4, pp. 325-360.
    • (2004) Quant. Inf. Comp , vol.4 , pp. 325-360
    • Gottesman, D.1    Lo, H.-K.2    Lütkenhaus, N.3    Preskill, J.4
  • 12
    • 0017973511 scopus 로고
    • Broadcast channels with confidential messages
    • I. Csiszàr and J. Körner (1978), Broadcast channels with confidential messages, IEEE Trans. Inf. Theory, Vol. 24, pp. 339-348.
    • (1978) IEEE Trans. Inf. Theory , vol.24 , pp. 339-348
    • Csiszàr, I.1    Körner, J.2
  • 13
    • 33846365694 scopus 로고    scopus 로고
    • Effects of detector efficiency mismatch on security of quantum cryptosystems
    • Ibid. 78, 019905 (2008)
    • V. Makarov, A. Anisimov and J. Skaar (2006), Effects of detector efficiency mismatch on security of quantum cryptosystems, Phys. Rev. A, Vol. 74, 022313; Ibid. 78, 019905 (2008).
    • (2006) Phys. Rev. A , vol.74 , pp. 022313
    • Makarov, V.1    Anisimov, A.2    Skaar, J.3
  • 14
    • 66449101012 scopus 로고    scopus 로고
    • Security proof of quantum key distribution with detection efficiency mismatch
    • C.-H. F. Fung, K. Tamaki, B. Qi, H.-K. Lo and X. Ma (2009), Security proof of quantum key distribution with detection efficiency mismatch, Quant. Inf. Comp., Vol. 9, pp. 131-165.
    • (2009) Quant. Inf. Comp , vol.9 , pp. 131-165
    • Fung C.-H., F.1    Tamaki, K.2    Qi, B.3    Lo, H.-K.4    Ma, X.5
  • 15
    • 44149085575 scopus 로고    scopus 로고
    • Faked states attack using detector efficiency mismatch on SARG04, phase-time, DPSK, and Ekert protocols
    • V. Makarov and J. Skaar (2008), Faked states attack using detector efficiency mismatch on SARG04, phase-time, DPSK, and Ekert protocols, Quant. Inf. Comp., Vol. 8, 0622.
    • (2008) Quant. Inf. Comp , vol.8 , pp. 0622
    • Makarov, V.1    Skaar, J.2
  • 16
    • 33846202211 scopus 로고    scopus 로고
    • Time-shift attack in practical quantum cryptosystems
    • B. Qi, C. H. F. Fung, H.-K. Lo and X. F. Ma (2007), Time-shift attack in practical quantum cryptosystems, Quant. Inf. Comp., Vol. 7, pp. 73-82.
    • (2007) Quant. Inf. Comp , vol.7 , pp. 73-82
    • Qi, B.1    Fung, C.H.F.2    Lo, H.-K.3    Ma, X.F.4
  • 17
    • 55049100546 scopus 로고    scopus 로고
    • Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems
    • Y. Zhao, C.-H. F. Fung, B. Qi, C. Chen and H.-K. Lo (2008), Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems, Phys. Rev. A, Vol. 78, 042333.
    • (2008) Phys. Rev. A , vol.78 , pp. 042333
    • Zhao, Y.1    Fung C.-H., F.2    Qi, B.3    Chen, C.4    Lo, H.-K.5
  • 18
    • 0035841906 scopus 로고    scopus 로고
    • Experimental quantum key distribution with proven security against realistic attacks
    • P. M. Nielsen, C. Schori, J. L. Sørensen, L. Salvail, I. Damgård and E. Polzik (2001), Experimental quantum key distribution with proven security against realistic attacks, J. Mod. Opt., Vol. 48, pp. 1921-1942.
    • (2001) J. Mod. Opt , vol.48 , pp. 1921-1942
    • Nielsen, P.M.1    Schori, C.2    Sørensen, J.L.3    Salvail, L.4    Damgård, I.5    Polzik, E.6
  • 21
    • 0033907404 scopus 로고    scopus 로고
    • An autocompensating fiber-optic quantum cryptography system based on polarization splitting of light
    • D. S. Bethune and W. P. Risk (2000), An autocompensating fiber-optic quantum cryptography system based on polarization splitting of light, IEEE J. Quantum Electron., Vol. 36, pp. 340-347.
    • (2000) IEEE J. Quantum Electron , vol.36 , pp. 340-347
    • Bethune, D.S.1    Risk, W.P.2
  • 22
    • 0035841908 scopus 로고    scopus 로고
    • Large pulse attack as a method of conventional optical eavesdropping in quantum cryptography
    • A. Vakhitov, V. Makarov and D. R. Hjelme (2001), Large pulse attack as a method of conventional optical eavesdropping in quantum cryptography, J. Mod. Opt., Vol. 48, pp. 2023-2038.
    • (2001) J. Mod. Opt , vol.48 , pp. 2023-2038
    • Vakhitov, A.1    Makarov, V.2    Hjelme, D.R.3
  • 23
    • 33646373811 scopus 로고    scopus 로고
    • Trojan-horse attacks on quantumkey-distribution systems
    • N. Gisin, S. Fasel, B. Kraus, H. Zbinden and G. Ribordy (2006), Trojan-horse attacks on quantumkey-distribution systems, Phys. Rev. A, Vol. 73, 022320.
    • (2006) Phys. Rev. A , vol.73 , pp. 022320
    • Gisin, N.1    Fasel, S.2    Kraus, B.3    Zbinden, H.4    Ribordy, G.5
  • 24
    • 5344222062 scopus 로고    scopus 로고
    • Optimal eavesdropping in quantum cryptography.1. information bound and optimal strategy
    • C. A. Fuchs, N. Gisin, R. B. Griffiths, C. S. Niu and A. Peres (1997), Optimal eavesdropping in quantum cryptography.1. information bound and optimal strategy, Phys. Rev. A, Vol. 56, pp. 1163-1172.
    • (1997) Phys. Rev. A , vol.56 , pp. 1163-1172
    • Fuchs, C.A.1    Gisin, N.2    Griffiths, R.B.3    Niu, C.S.4    Peres, A.5
  • 25
    • 0027599802 scopus 로고
    • Secret key agreement by public discussion from common information
    • U. M. Maurer (1993), Secret key agreement by public discussion from common information, IEEE Trans. Inf. Theory, Vol. 39, pp. 733-742.
    • (1993) IEEE Trans. Inf. Theory , vol.39 , pp. 733-742
    • Maurer, U.M.1
  • 26
    • 0003560577 scopus 로고
    • Optimal quantum measurements for two pure and mixed states
    • V. P. Belavkin, O. Hirota and R. L. Hudson, Editors, Plenum Press, New York
    • L. B. Levitin (1995), Optimal quantum measurements for two pure and mixed states in V. P. Belavkin, O. Hirota and R. L. Hudson, editors, Quantum Communications and Measurement, Plenum Press, New York, pp. 439-448.
    • (1995) Quantum Communications and Measurement , pp. 439-448
    • Levitin, L.B.1
  • 27
    • 0041415963 scopus 로고    scopus 로고
    • Quantum key distribution with high loss: Toward global secure communication
    • W. Y. Hwang (2003), Quantum key distribution with high loss: Toward global secure communication, Phys. Rev. Lett., Vol. 91, 057901.
    • (2003) Phys. Rev. Lett , vol.91 , pp. 057901
    • Hwang, W.Y.1
  • 28
    • 27744568650 scopus 로고    scopus 로고
    • Beating the photon-number-splitting attack in practical quantum cryptography
    • X.-B. Wang (2005), Beating the photon-number-splitting attack in practical quantum cryptography, Phys. Rev. Lett., Vol. 94, 230503.
    • (2005) Phys. Rev. Lett , vol.94 , pp. 230503
    • Wang, X.-B.1
  • 29
    • 27744479495 scopus 로고    scopus 로고
    • Decoy state quantum key distribution
    • H.-K. Lo, X. F. Ma and K. Chen (2005), Decoy state quantum key distribution, Phys. Rev. Lett., Vol. 94, 230504.
    • (2005) Phys. Rev. Lett , vol.94 , pp. 230504
    • Lo, H.-K.1    Ma, X.F.2    Chen, K.3
  • 31
    • 0002787793 scopus 로고
    • Experimental realization of any discrete unitary operator
    • M. Reck, A. Zeilinger, H. J. Bernstein and P. Bertani (1994), Experimental realization of any discrete unitary operator, Phys. Rev. Lett., Vol. 73, pp. 58-61.
    • (1994) Phys. Rev. Lett , vol.73 , pp. 58-61
    • Reck, M.1    Zeilinger, A.2    Bernstein, H.J.3    Bertani, P.4
  • 33
    • 33646412037 scopus 로고    scopus 로고
    • Simple security proof of quantum key distribution via uncertainty principle
    • M. Koashi (2006), Simple security proof of quantum key distribution via uncertainty principle, J. of Phys. Conference Series, Vol. 36, 98.
    • (2006) J. of Phys. Conference Series , vol.36 , pp. 98
    • Koashi, M.1
  • 34
    • 0001287029 scopus 로고
    • Generalized entropic uncertainty relations
    • H. Maassen and J. B. M. Uffink (1988), Generalized entropic uncertainty relations, Phys. Rev. Lett., Vol. 60, pp. 1103-1106.
    • (1988) Phys. Rev. Lett , vol.60 , pp. 1103-1106
    • Maassen, H.1    Uffink, J.B.M.2
  • 35
    • 24144485355 scopus 로고    scopus 로고
    • Universally composable privacy amplification against quantum adversaries
    • J. Kilian, editor, LNCS, Springer Verlag, Berlin, also available at
    • R. Renner and R. Koenig (2005), Universally composable privacy amplification against quantum adversaries in J. Kilian, editor, Second Theory of Cryptography Conference, TCC 2005, Vol. 3378 of LNCS, Springer Verlag, Berlin, pp. 407-425, also available at http://arxiv.org/abs/quant-ph/0403133.
    • (2005) Second Theory of Cryptography Conference, TCC , vol.3378 , pp. 407-425
    • Renner, R.1    Koenig, R.2
  • 36
    • 24144445587 scopus 로고    scopus 로고
    • The universal composable security of quantum key distribution
    • Lecture Notes in Computer Science, Springer, New York
    • M. Ben-Or, M. Horodecki, D. Leung, D. Mayers and J. Oppenheim (2005), The universal composable security of quantum key distribution in Second Theory of Cryptography Conference, Vol. 3378 of Lecture Notes in Computer Science, Springer, New York, pp. 386-406.
    • (2005) Second Theory of Cryptography Conference , vol.3378 , pp. 386-406
    • Ben-Or, M.1    Horodecki, M.2    Leung, D.3    Mayers, D.4    Oppenheim, J.5
  • 37
    • 34547506608 scopus 로고    scopus 로고
    • Security of quantum key distribution using weak coherent states with nonrandom phases
    • H.-K. Lo and J. Preskill (2007), Security of quantum key distribution using weak coherent states with nonrandom phases, Quant. Inf. Comp., Vol. 7, pp. 431-458.
    • (2007) Quant. Inf. Comp , vol.7 , pp. 431-458
    • Lo, H.-K.1    Preskill, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.