The security and recent technology of quantum key distribution

被引:1
|
作者
Wang X.-B. [1 ]
Ying H. [2 ]
Ma H.-X. [2 ]
Peng C.-Z. [1 ]
Yang T. [3 ]
Pan J.-W. [3 ]
机构
[1] Department of Physics, Tsinghua University
[2] China Electronic System Engineering Company
[3] Hefei National Laboratory for Physical Sciences at Microscale, University of Science and Technology of China
来源
Frontiers of Physics in China | 2006年 / 1卷 / 3期
关键词
BB84; method; Decoy-state method; Photon-number-splitting attack; QKD; Security;
D O I
10.1007/s11467-006-0023-y
中图分类号
学科分类号
摘要
In principle, quantum key distribution (QKD) can be used to make unconditionally secure private communication. However, the security of the existing real system for QKD needs to be carefully examined. Actually, the existing experiments based on weak coherent states are not secure under photon-number-splitting attack. Fortunately, the decoy-state method and the entanglement-distribution method can be used to realize the unconditionally secure QKD based on real-life systems with existing technology. © Higher Education Press and Springer-Verlag 2006.
引用
收藏
页码:251 / 255
页数:4
相关论文
共 50 条
  • [21] Quantum key distribution: Security, feasibility and robustness
    Wang, Xiang-Bin
    QUANTUM COMPUTATION AND INFORMATION: FROM THEORY TO EXPERIMENT, 2006, 102 : 185 - 233
  • [22] Security of quantum key distribution with intensity correlations
    Zapatero, Victor
    Navarrete, Alvaro
    Tamaki, Kiyoshi
    Curty, Marcos
    QUANTUM, 2021, 5 : 1 - 27
  • [23] Security of "asymmetrical quantum key distribution protocol"
    Li, Chuan-Ming
    Hwang, Tzonelih
    Lee, Kuo-Chang
    INTERNATIONAL JOURNAL OF MODERN PHYSICS C, 2007, 18 (02): : 157 - 161
  • [24] Practical evaluation of security for quantum key distribution
    Hayashi, Masahito
    PHYSICAL REVIEW A, 2006, 74 (02):
  • [25] Security of Key Distribution and Complementarity in Quantum Mechanics
    Koashi, Masato
    INFORMATION THEORETIC SECURITY, 2010, 5973 : 27 - 27
  • [26] Unconditional security of practical quantum key distribution
    H. Inamori
    N. Lütkenhaus
    D. Mayers
    The European Physical Journal D, 2007, 41
  • [27] Security of quantum key distribution with entangled qutrits
    Toegepaste Natuurkunde en Fotonica, Theoretische Natuurkunde, Vrije Universiteit Brussel, Pleinlaan 2, 1050 Brussels, Belgium
    不详
    不详
    不详
    Physical Review A - Atomic, Molecular, and Optical Physics, 2003, 67 (01): : 1 - 012311
  • [28] The universal composable security of quantum key distribution
    Ben-Or, M
    Horodecki, M
    Leung, DW
    Mayers, D
    Oppenheim, J
    THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2005, 3378 : 386 - 406
  • [29] Security of quantum key distribution with imperfect devices
    Gottesman, D
    Lo, HK
    Lütkenhaus, N
    Preskill, J
    QUANTUM INFORMATION & COMPUTATION, 2004, 4 (05) : 325 - 360
  • [30] Security of quantum key distribution with multiphoton components
    Hua-Lei Yin
    Yao Fu
    Yingqiu Mao
    Zeng-Bing Chen
    Scientific Reports, 6