CFP last date
22 April 2024
Reseach Article

Quantum Key Distribution: A Resource Letter

by Srinivasan Arunachalam
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 37 - Number 3
Year of Publication: 2012
Authors: Srinivasan Arunachalam
10.5120/4586-6521

Srinivasan Arunachalam . Quantum Key Distribution: A Resource Letter. International Journal of Computer Applications. 37, 3 ( January 2012), 11-17. DOI=10.5120/4586-6521

@article{ 10.5120/4586-6521,
author = { Srinivasan Arunachalam },
title = { Quantum Key Distribution: A Resource Letter },
journal = { International Journal of Computer Applications },
issue_date = { January 2012 },
volume = { 37 },
number = { 3 },
month = { January },
year = { 2012 },
issn = { 0975-8887 },
pages = { 11-17 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume37/number3/4586-6521/ },
doi = { 10.5120/4586-6521 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:23:19.760757+05:30
%A Srinivasan Arunachalam
%T Quantum Key Distribution: A Resource Letter
%J International Journal of Computer Applications
%@ 0975-8887
%V 37
%N 3
%P 11-17
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Quantum key distribution (QKD) is one of the best-known examples of an application of quantum mechanics to cryptography. This article serves as a resource letter, a brief description to the introduction of QKD is provided before surveying the most prominent QKD protocols present in the literature from theoretical initialization by Wiesner to the attempts at practical implementations. We have also given an overview of the different security proofs proposed, for the variations in protocols and highlighted their significance.

References
  1. S.J. Wiesner; “Conjugate Coding” ; SIGACT News 15:1; 1983. pp. 78-88
  2. Michael O. Rabin; “How To Exchange Secrets with Oblivious Transfer”; Harvard University Technical Report 81
  3. C. H. Bennett and G. Brassard; “Quantum Cryptography: Public key distribution and coin tossing”; in Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing, Bangalore; 1984 pp.175
  4. Ekert A.K.; “Quantum Cryptography based on Bell’s Theorem”; Physical Review Letters, vol.67, no.6, 1991 pp. 661-663
  5. Bennett C.H.; “Quantum cryptography using any two nonorthogonal states” ; Physical Review Letters, vol. 68, no. 21, 1992, pp. 3121 - 2124.
  6. N. Gisin, talk presented at the Workshop on Quantum Computation, Torino,D. Bruss, Phys. Rev. Lett. 81, 3018, 1998.
  7. Bruss.D, Macchiavello.C; “Optimal eavesdropping in cryptography with three-dimensional quantum states”; Phys. Rev. Lett. 88, 127901 (2002)
  8. Bechmann-Pasquinucci, H., and Gisin, N.; “Incoherent and coherent eavesdropping in the six-state protocol of quantum cryptography”; Phys. Rev. A 59, 4238-4248, 1999.
  9. Mohammed Ardehali, Gilles Brassardt , H. F. Chaut , Hoi-Kwong Lo; “Efficient Quantum Key Distribution” ; Manuscript, 1992.
  10. Scarani A., Acin, A., Ribordy, G., Gisin, N.; “Quantum cryptography protocols robust against photon number splitting attacks.”; Physical Review Letters, vol. 92, 2004
  11. Nicolas Gisin, Gregoire Ribordy, Hugo Zbinden, Damien Stucki, Nicolas Brunner, Valerio Scarani; “Towards practical and fast Quantum Cryptography”; arXiv:quant-ph/0411022v1
  12. Lior Goldenberg and Lev Vaidman; “Quantum Cryptography Based on Orthogonal States” ; Phys.Rev.Lett.75:1239-1243,1995
  13. Kyo Inoue,H. Takesue, T. Honjo; “Differential-Phase-Shift Quantum Key Distribution”; Amer. Math. Monthly 110 (2003) 435-437
  14. Boris A. Slutsky, Ramesh Rao, Pang-Chen Sun, and Y. Fainman; “Security of quantum cryptography against individual attacks”; Phys. Rev. A 57, 2383-2398 (1998)
  15. Shor P. , Preskill J.; “Simple Proof of Security of the BB84 Quantum Key Distribution Protocol”; Phys.Rev.Lett.85:441-444,2000
  16. Renato Renner; “Security of Quantum Key Distribution”; arXiv:quant-ph/0512258v2
  17. Daniel Gottesman, Hoi-Kwong Lo, Norbert Ltkenhaus, John Preskill; “Security of quantum key distribution with imperfect devices” ; Quant.Inf.Comput. 5 (2004) 325-360
  18. Norbert Ltkenhaus “Security against individual attacks for realistic quantum key distribution”; Physical Review A, Vol. 61, 052304(2000);
  19. Hoi-Kwong Lo, H. F. Chau; “Unconditional Security Of Quantum Key Distribution Over Arbitrarily Long Distances”; Science 283 (1999) 2050-2056
  20. M. Ben-Or, Michal Horodecki, D. W. Leung, D. Mayers, J. Oppenheim; “The Universal Composable Security of Quantum Key Distribution”; Theory of Cryptography: Second Theory of Cryptography Conference, TCC 2005, J.Kilian (ed.) Springer Verlag 2005, vol. 3378 of Lecture Notes in Computer Science, pp. 386-406
  21. Daniel Gottesman , Hoi-Kwong Lo; “Proof of security of quantum key distribution with two-way classical communications”; IEEE Transactions on Information Theory, Vol. 49, No. 2, p. 457 (2003).
  22. Stefano Pironio, Antonio Acin, Nicolas Brunner, Nicolas Gisin, Serge Massar, Valerio Scarani; “Device-independent security of quantum cryptography against collective attacks”; New J. Phys. 11, 045021 (2009).
  23. Mayers, D.; “Unconditional security in Quantum Cryptography”; JACM, vol 48, no 3, May 2001, p 351-406.
  24. Mayers D., and Yao A.; “Quantum cryptography with imperfect apparatus”; In Proceedings of the 39th IEEE Conference on Foundations of Computer Science. IEEE Computer Society Press.
  25. Mayers, D.; “Self-Checking Quantum Apparatus and Violation of Classical Locality”; Manuscript
  26. Valerio Scarani, Helle Bechmann-Pasquinucci, Nicolas J. Cerf, Miloslav Du, Norbert Lutkenhaus, Momtchil Peev; “The Security of Practical Quantum Key Distribution”; Rev. Mod. Phys. 81, 1301 (2009)
  27. Hitoshi Inamori, Norbert Ltkenhaus, Dominic Mayers; “Unconditional Security of Practical Quantum Key Distribution”; European Physical Journal D, Vol 41, p.599 (2007)
  28. Jonathan Barrett, Lucien Hardy , Adrian Kent; “No Signalling and Quantum Key Distribution”; Phys. Rev. Lett. 95, 010503 (2005)
  29. Bennett, C. H. and Brassard, G.; “The dawn of a new era for quantum cryptography: The experimental prototype is working!”; Sigact News, vol. 20, no. 4, 1989, pp. 78 – 82
  30. Yi Zhao, Bing Qi, Xiongfeng Ma, Hoi-Kwong Lo, Li Qian; “Experimental Quantum Key Distribution with Decoy States”; Physical Review Letters 96, 070502 (2006).
  31. A. Muller, J. Breguet and N. Gisin; “Experimental Demonstration of Quantum Cryptography Using Polarized Photons in Optical Fibre over More than 1km”; Europhysics Letters Volume 23 Number 6, 1993 .
  32. Townsend, P. D., Rarity, J. G. and Tapster, P. R; Enhanced single photon fringe visibility in a 10 km-long prototype quantum cryptography channel; Electronics Letters, vol. 29, no. 14, 8 July 1993, pp. 1291 - 1293.
  33. A. Muller, J. Breguet and N. Gisin; “Quantum Cryptography with Polarized Photons in Optical Fibers: Experimental and Practical Limits”; Journal of Modern Optics Volume 41, Issue 12, 1994
  34. Richard J. Hughes, George L. Morgan, C. Glen Peterson; “Practical quantum key distribution over a 48-km optical fiber network”; Journal of Modern Optics,LA-UR-99-1593, 1999.
  35. K. J. Resch, M. Lindenthal, B. Blauensteiner, H. R. Boehm, A Fedrizzi, C . Kurtsiefer, A. Poppe, T. Schmitt-Manderbach, M. Taraba, R. Ursin, P.Walther, H.Weiner, H.Weinfurter, A. Zeilinger; “Distributing entanglement and single photons through an intra-city, free-space quantum channel”; Opt. Express 13, 202-209 (2005).
  36. Martin Hendrych; Experimental Quantum Cryptography; PhD. Thesis 2002
  37. Gregoire Ribordy, Juergen Brendel, Jean-Daniel Gautier, Nicolas Gisin, Hugo Zbinden; Long distance entanglement based quantum key distribution; Phys. Rev. A 63, 012309 (2000)
  38. C. Gobby, Z. L. Yuan, and A. J. Shields; “Quantum key distribution over 122 km of standard telecom fiber”; Applied Physics Letters 84, 3762-3764(2004)
  39. Hiroki Takesue, Sae Woo Nam, Qiang Zhang, Robert H. Hadfield, Toshimori Honjo, Kiyoshi Tamaki, Yoshihisa Yamamoto; “Quantum key distribution over 40 dB channel loss using superconducting single photon detectors”; Nature Photonics 1, 343 (2007) (revised version)
  40. P. A. Hiskett, D. Rosenberg, C. G. Peterson, R. J. Hughes, S. Nam,E. Lita, A. J. Miller, J. E. Nordholt; “Long-distance quantum key distribution in optical fiber”; New J. Phys. 8 193, 2006
  41. Nicolas J. Cerf, Mohamed Bourennane, Anders Karlsson, Nicolas Gisin; “Security of quantum key distribution using d-level systems”; Phys. Rev. Lett. 88, 127902 (2002).
  42. W.-Y. Hwang; “Quantum Key Distribution with High Loss: Toward Global Secure Communication”; Physical Review Letters 91, 057901 (2003);
  43. H.-J. Briegel, W. Dr, J. I. Cirac, P. Zoller; “Quantum repeaters for communication”; arXiv:quant-ph/9803056v1
  44. Zhen-Sheng Yuan, Yu-Ao Chen, Bo Zhao, Shuai Chen, Joerg Schmiedmayer, Jian-Wei Pan; “Experimental demonstration of a BDCZ quantum repeater node”; Nature 454, 1098 (2008)
  45. Michael A. Nielsen and Isaac L. Chuang; Quantum Computation and Quantum Information; 10th edition.
  46. Joern Mueller-Quade, Renato Renner; “Composability in quantum cryptography”; New Journal of Physics, 11, 085006, 2009 (Focus on Quantum Cryptography: Theory and Practice)
  47. Gilles Brassard, Norbert Ltkenhaus, Tal Mor, and Barry C. Sanders; “Limitations on Practical Quantum Cryptography”; Physical Review Letters, Volume 85, No. 6
  48. Thomas Jennewein , Christoph Simon , Gregor Weihs , Harald WeinfurterD, Anton Zeilinger; “Quantum Cryptography with Entangled Photons”; Phys. Rev. Lett. 84, 4729-4732 (2000)
  49. John Preskill; “Fault-tolerant quantum computation”; arXiv:quantph/ 9712048v1
  50. Llus Masanes, Stefano Pironio , Antonio Acn; “Secure deviceindependent quantum key distribution with causally independent measurement devices”; Nature Communications 2, Article number:238, 2011
  51. G Brassard ; “Bibliography of Quantum Cryptography”;
  52. Nicolas Gisin, Grgoire Ribordy, Wolfgang Tittel, Hugo Zbinden; “Quantum cryptography”; Rev. Mod. Phys. 74, 145-195 (2002)
  53. Douglas Stebila, Michele Mosca and Norbert Ltkenhaus; “The Case for Quantum Key Distribution”; arXiv:0902.2839v2
Index Terms

Computer Science
Information Sciences

Keywords

Quantum Key Distribution BB84 Quantum Cryptography Security Implementation