# Quantum Cryptography

@article{Gisin2001QuantumC, title={Quantum Cryptography}, author={Nicolas Gisin and Gregoire Ribordy and Wolfgang Tittel and Hugo Zbinden}, journal={Reviews of Modern Physics}, year={2001} }

II A beautiful idea 2 A The intuition . . . . . . . . . . . . . . . 2 B Classical cryptography . . . . . . . . . 3 1 Asymmetrical (public-key) cryptosystems . . . . . . . . . . . . . . . 3 2 Symmetrical (secret-key) cryptosystems . . . . . . . . . . . . . . . . . 4 3 The one-time-pad as “classical teleportation” . . . . . . . . . . . . . . 5 C The example of the BB84 protocol . . . 5 1 Principle . . . . . . . . . . . . . . . 5 2 No cloning theorem . . . . . . . . . 6 3 Intercept-resend strategy… Expand

#### Figures and Tables from this paper

#### Paper Mentions

#### 2,883 Citations

A Security Real-time Privacy Amplification Scheme in QKD System

- Computer Science
- J. Univers. Comput. Sci.
- 2013

This paper proposes the real-time privacy amplification (RTPA) scheme which converts the weak secret string to a uniform key that is fully secret from Eve and implements the ARTPA scheme based on CLIP system, which is connected to the quantum communication system. Expand

Using quantum key distribution for cryptographic purposes: A survey

- Computer Science, Physics
- Theor. Comput. Sci.
- 2014

This survey article reviews and compares the properties of the existing key establishment techniques, QKD being one of them, and studies two generic scenarios related to the practical use of QKKD in cryptographic infrastructures: 1) usingQKD as a key renewal technique for a symmetric cipher over a point-to-point link; 2) using QD in a network containing many users with the objective of offering any- to-any key establishment service. Expand

Quantum Cryptography

- 2010

Quantum cryptography makes use of the quantum-mechanical behavior of nature for the design and analysis of cryptographic schemes. Optimally (but not always), quantum cryptography allows for the… Expand

On the optimality of individual entangling-probe attacks
against BB84 quantum key distribution

- Physics
- 2008

Abstract.Some MIT researchers [Phys. Rev. A
75, 042327 (2007)] have recently claimed that
their implementation of the Slutsky-Brandt attack [Phys. Rev. A
57, 2383 (1998); Phys. Rev. A 71, 042312… Expand

A Novel NTT-Based Authentication Scheme for 10-GHz Quantum Key Distribution Systems

- Computer Science
- IEEE Transactions on Industrial Electronics
- 2016

The experimental results show that the N-Auth algorithm can fully meet the real-time and high-performance demands of modern 10-GHz QKD systems, making it a viable solution for the implementation of industrial-strength unconditionally secure broadband communication solutions. Expand

Cache-Side-Channel Quantification and Mitigation for Quantum Cryptography

- Computer Science
- ESORICS
- 2021

This article investigates the role of the software implementation for the security of quantum cryptography against cache side channels and proposes a cost model for the combined mitigation, which allows one to optimize the interaction between privacy amplification and program rewriting for the mitigation. Expand

A Fuzzy Vault Scheme

- Mathematics, Computer Science
- Des. Codes Cryptogr.
- 2006

Fuzzy vaults have potential application to the problem of protecting data in a number of real-world, error-prone environments and also to biometric authentication systems, in which readings are inherently noisy as a result of the refractory nature of image capture and processing. Expand

Quantum Computing: The Risk to Existing Encryption Methods

- Mathematics
- 2015

The basis of modern security relies on encryption methods that are practically impossible, but theoretically possible, to break. The most common is the Rivest-Shamir-Adleman (RSA) cryptosystem, which… Expand

Quantum Cryptography: Opportunities and Challenges

- Computer Science
- 2009

The flaws of quantum cryptographic systems are discussed along with the plans for enhancing current quantum cryptography systems. Expand

Quantum Key Distribution Protocols

- Computer Science
- Quantum Key Distribution
- 2021

The goal of any quantum key distribution protocol is to generate a shared secret key between two distant parties over a public communication channel, and the key generating protocol is provably secure against any possible attack that an eavesdropper can perform. Expand

#### References

SHOWING 1-10 OF 308 REFERENCES

The code book: the science of secrecy from ancient egypt to quantum cryptography [Book Review]

- Computer Science, Physics
- IEEE Annals of the History of Computing
- 2002

The Cipher of Mary Queen of Scots: From Shunning Vigenère to the Man in the Iron Mask is a posthumous publication based on a manuscript originally written by Gordon C. Dickinson in 2005 and then edited by David I. Dickinson. Expand

Advances in cryptology--CRYPTO '91 : proceedings

- Mathematics
- 1992

Protocol Design and Analysis.- A Calculus for Access Control in Distributed Systems.- Deriving the Complete Knowledge of Participants in Cryptographic Protocols.- Systematic Design of Two-Party… Expand

Advances in Cryptology: Proceedings Of Crypto 83

- Computer Science
- 1985

Some Public-Key Crypto-Functions as Intractable as Factorization as well as Cryptosystems and Other Hard Problems. Expand

Free-space quantum key distribution in daylight

- Computer Science
- 2000

The theory of quantum cryptography is described, and the most recent results from the experimental free-space system with which it is demonstrated for the first time the feasibility of quantum key generation over a point-to-point outdoor atmospheric path in daylight are described. Expand

Quantum Privacy Amplification and the Security of Quantum Cryptography over Noisy Channels.

- Physics, Medicine
- Physical review letters
- 1996

The concept of quantum privacy amplification and a cryptographic scheme incorporating it which is provably secure over a noisy channel is introduced and implemented using technology that is currently being developed. Expand

Modern Cryptology

- Computer Science
- Lecture Notes in Computer Science
- 1988

This introductory article presents first of all the two principal categories of cryptographic procedures which are most frequently used: encryption algorithms, which serve to protect the confidentiality of data and signature algorithms which, just like handwritten signatures, guarantee the provenance and the integrity of messages. Expand

Quantum Cryptography on Noisy Channels: Quantum versus Classical Key-Agreement Protocols

- Computer Science, Physics
- 1999

This Letter concerns the dialog between quantum physics and information theory in the context of optimal eavesdropping on a quantum channel and the corresponding secret-key agreement that, in principle, both quantum and classical algorithms provide. Expand

Practical Quantum Cryptography: A Comprehensive Analysis (Part One)

- Physics, Mathematics
- 2000

We perform a comprehensive analysis of practical quantum cryptography (QC) systems implemented in actual physical environments via either free-space or fiber-optic cable quantum channels for… Expand

A method for obtaining digital signatures and public-key cryptosystems

- Computer Science
- CACM
- 1978

An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key, soriers or other secure means are not needed to transmit keys. Expand

Quantum cryptography on multiuser optical fibre networks

- Computer Science
- Nature
- 1997

A practical scheme for multi-user quantum cryptography is introduced, and its operation on an optical fibre network is demonstrated, which enables a single controller on the network to establish, and regularly update, a distinct secret key with each network user. Expand