Experimental quantum key distribution with proven security against realistic attacks

被引:21
作者
Nielsen, PM [1 ]
Schori, C
Sorensen, JL
Salvail, L
Damgård, I
Polzik, E
机构
[1] Aarhus Univ, Inst Phys & Astron, DK-8000 Aarhus, Denmark
[2] Aarhus Univ, Dept Comp Sci, Danish Natl Res Fdn Ctr, BRICS, DK-8000 Aarhus, Denmark
关键词
Quantum key distribution - Realistic attacks - Security analysis - Single photon measurement - Single photon pulses;
D O I
10.1080/09500340110069237
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
We report on a realization of a fully automated 20 km quantum key distribution system incorporating real time error correction and privacy amplification protocols carried out via the Internet. Dedicated security analysis against realistic attacks is used to optimize the system parameters in order to maximize the secrecy capacity for the communication over the 20 km distance.
引用
收藏
页码:1921 / 1942
页数:22
相关论文
共 12 条
[1]  
Bennett C. H., 1992, Journal of Cryptology, V5, P3, DOI 10.1007/BF00191318
[2]   Generalized privacy amplification [J].
Bennett, CH ;
Brassard, G ;
Crepeau, C ;
Maurer, UM .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1995, 41 (06) :1915-1923
[3]   PRIVACY AMPLIFICATION BY PUBLIC DISCUSSION [J].
BENNETT, CH ;
BRASSARD, G ;
ROBERT, JM .
SIAM JOURNAL ON COMPUTING, 1988, 17 (02) :210-229
[4]   QUANTUM CRYPTOGRAPHY USING ANY 2 NONORTHOGONAL STATES [J].
BENNETT, CH .
PHYSICAL REVIEW LETTERS, 1992, 68 (21) :3121-3124
[5]  
Brassard G, 2000, LECT NOTES COMPUT SC, V1807, P289
[6]  
Brassard G., 1994, LECT NOTES COMPUTER, V765, P410, DOI [DOI 10.1007/3-540-48285-7_35, 10.1007/3-540-48285-7_35]
[7]  
DUSEK M, 1999, QUANTPH9910106V2
[8]  
FUCHS CA, 1997, QUANTPH9712042
[9]  
Krawczyk H., 1994, LECT NOTES COMPUTER, V893, P129
[10]  
Lütkenhaus N, 2000, PHYS REV A, V61, DOI 10.1103/PhysRevA.61.052304