Experimental quantum cryptography
Journal of Cryptology - Eurocrypt '90
A proof of the security of quantum key distribution (extended abstract)
STOC '00 Proceedings of the thirty-second annual ACM symposium on Theory of computing
Unconditional security in quantum cryptography
Journal of the ACM (JACM)
Security of quantum key distribution with imperfect devices
Quantum Information & Computation
Quantum Information & Computation
Quantum Information & Computation
Upper bounds on the performance of differential-phase-shift quantum key distribution
Quantum Information & Computation
Hi-index | 0.00 |
We investigate limitations imposed by sequential attacks on the performance of differential-phase-shift quantum key distribution protocols that use pulsed coherent light. In particular, we analyze two sequential attacks based on unambiguous state discrimination and minimum error discrimination, respectively, of the signal states emitted by the source. Sequential attacks represent a special type of intercept-resend attacks and, therefore, they provide ultimate upper bounds on the maximal distance achievable by quantum key distribution schemes.