# Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations.

@article{Scarani2004QuantumCP, title={Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations.}, author={Valerio Scarani and Antonio Ac{\'i}n and Gregoire Ribordy and Nicolas Gisin}, journal={Physical review letters}, year={2004}, volume={92 5}, pages={ 057901 } }

We introduce a new class of quantum key distribution protocols, tailored to be robust against photon number splitting (PNS) attacks. We study one of these protocols, which differs from the original protocol by Bennett and Brassard (BB84) only in the classical sifting procedure. This protocol is provably better than BB84 against PNS attacks at zero error.

#### 560 Citations

A Modified Quantum Key Distribution Without Public Announcement Bases Against Photon-Number-Splitting Attack

- Mathematics
- 2012

The security of quantum cryptography without public announcement bases in photon-number-splitting attack is discussed. Based on unambiguous state discrimination, we propose two attack strategies and… Expand

New protocol for quantum public key cryptography

- Physics, Computer Science
- 2015 IEEE International Conference on Advanced Networks and Telecommuncations Systems (ANTS)
- 2015

A quantum public key cryptographic protocol that allow Bob to send any arbitrary qubit state to Alice, securely, using quantum entanglement and does not discard any qubits during the transfer process is presented. Expand

Principles of quantum cryptography/quantum key distribution (QKD) using attenuated light pulses

- Mathematics
- 2014

Abstract: Based on the very foundations of quantum physics, quantum information methods can enhance conventional communication methods and enable completely new types of information processing.… Expand

On geometrically uniform states in quantum cryptography

- Computer Science
- 2012

A family of quantum key distribution protocols based on geometrically uniform states of laser radiation has been proposed. Their cryptographic strength against a unitary attack, a… Expand

Security proof of Improved-SARG04 protocol using the same four qubit states

- Computer Science
- International Conference On Photonics 2010
- 2010

This protocol differs from BB84 and SARG04 protocol in the sifting process and provably outperforms those protocols against Photon Number Splitting attack at zero error, with secure transmission distance of 125 km of SSMF. Expand

Megabits secure key rate quantum key distribution

- Physics
- 2009 Conference on Lasers and Electro-Optics and 2009 Conference on Quantum electronics and Laser Science Conference
- 2009

Imperfect practical conditions limit communication speed of Quantum cryptography. Here we implement differential phase shift quantum key distribution with up-conversion assisted hybrid photon… Expand

Megabits secure key rate quantum key distribution

- Physics
- 2009

Quantum cryptography can provide unconditional secure communication between two authorized parties based on the basic principles of quantum mechanics. However, imperfect practical conditions limit… Expand

Study on Quantum Key Distribution

- Computer Science
- 2013

QKD is a research hotspot of international academia in recent years and some protocols are introduced: BB84 protocol, E91 protocol, SARG04 protocol. Expand

Free space relativistic quantum cryptography with faint laser pulses

- Physics
- 2013

A new protocol for quantum key distribution through empty space is proposed. Apart from the quantum mechanical restrictions on distinguishability of non-orthogonal states, the protocol employs… Expand

Quantum key distribution technologies

- Computer Science
- IEEE Journal of Selected Topics in Quantum Electronics
- 2006

This paper describes QC technologies, introduces a typical and widely used QC protocol BB84 and then describes a recently proposed scheme called the differential-phase-shift protocol. Expand

#### References

SHOWING 1-10 OF 24 REFERENCES

Coherent-pulse implementations of quantum cryptography protocols resistant to photon-number-splitting attacks

- Physics
- 2004

We propose a class of quantum cryptography protocols that are robust against photon-number-splitting attacks (PNS) in a weak coherent-pulse implementation. We give a quite exhaustive analysis of… Expand

Limitations on practical quantum cryptography

- Computer Science, Medicine
- Physical review letters
- 2000

It is shown that parametric down-conversion offers enhanced performance compared to its weak coherent pulse counterpart and existing experimental schemes (based on weak pulses) currently do not offer unconditional security for the reported distances and signal strength. Expand

Security against individual attacks for realistic quantum key distribution

- Physics
- 1999

The first complete protocol for quantum key distribution (qkd) has been introduced by Bennett and Brassard in 1984 [1] following earlier ideas by Wiesner [2]. Since then, this protocol (BB84 for… Expand

Rev

- Mod. Phys. 74, 145
- 2002

Phys

- Rev. Lett. 91, 057901
- 2003

Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulses implementations

- Phys . Rev . A
- 2002

Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulses implementations . quant-ph

- Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulses implementations . quant-ph
- 2002

Rev. Mod. Phys

- Rev. Mod. Phys
- 2002

Zbinden. Quantum cryptography. Rev. Mod. Phys

- Zbinden. Quantum cryptography. Rev. Mod. Phys
- 2002

J. Mod. Opt

- J. Mod. Opt
- 2001