Unconditional security of practical quantum key distribution

  • H. Inamori
  • N. LütkenhausEmail author
  • D. Mayers
Highlight Paper


We present a complete protocol for BB84 quantum key distribution for a realistic setting (noise, loss, multi-photon signals of the source) that covers many of todays experimental implementations. The security of this protocol is shown against an eavesdropper having unrestricted power to manipulate the signals coherently on their path from sender to receiver. The protocol and the security proof take into account the effects concerning the finite size of the generated key. This paper is identical to the preprint arXiv:quant-ph/0107017, which was finalized in 2001. Therefore, some of the more recent developments, including the question of composability, are not addressed.


03.67.Dd Quantum cryptography 


21.20.Kd Quantum key distribution 22.70.+S Security proofs 


  1. H. Inamori, N. Lütkenhaus, D. Mayers, Inconditional Security for Practical Quantum Key Distribution, arXiv:quant-ph/0107017 (2001) Google Scholar
  2. D. Mayers, Quantum key distribution and string oblivious transfer in noisy channels, In Advances in Cryptology  —  Proceedings of Crypto '96; available as arXiv:quant-ph/9606003 (Springer, Berlin, 1996), pp. 343–357 Google Scholar
  3. D. Mayers, Unconditional security in quantum cryptography, J. ACM (2001) (to appear); also available at arXiv:quant-ph/9802025 Google Scholar
  4. B. Huttner, N. Imoto, N. Gisin, T. Mor, Phys. Rev. A 51, 1863 (1995) CrossRefADSGoogle Scholar
  5. H.P. Yuen, Quantum Semiclassic. Opt. 8, 939 (1996) CrossRefADSGoogle Scholar
  6. G. Brassard, N. Lütkenhaus, T. Mor, B. Sanders, Phys. Rev. Lett. 85, 1330 (2000) CrossRefADSGoogle Scholar
  7. N. Lütkenhaus, Phys. Rev. A 61, 052304 (2000) CrossRefADSGoogle Scholar
  8. E. Biham, M. Boyer, P.O. Boykin, T. Mor, V. Roychowdhury, A proof of the security of quantum key distribution, arXiv:quant-ph/9912053 (1999) Google Scholar
  9. P.W. Shor, J. Preskill, Phys. Rev. Lett. 85, 441 (2000) CrossRefADSGoogle Scholar
  10. B. Huttner, A. Ekert, J. Mod. Opt. 41, 2455 (1994); C. Fuchs, N. Gisin, R. Griffiths, C.-S. Niu, A. Peres, Phys. Rev. A 56, 1163 (1997); B. Slutsky, R. Rao, P. Sun, Y. Fainman, Phys. Rev. A 57, 2383 (1998); N. Lütkenhaus, Phys. Rev. A 59, 3301 (1999) ADSMathSciNetGoogle Scholar
  11. J. Cirac, N. Gisin, Phys. Lett. A 229, 1 (1997); H. Bechmann-Pasquinucci, N. Gisin, Phys. Rev. A 59, 4238 (1999) zbMATHCrossRefADSMathSciNetGoogle Scholar
  12. E. Biham, T. Mor, Phys. Rev. Lett. 78, 2256 (1997); E. Biham, M. Boyer, G. Brassard, J. van de Graaf, T. Mor, arXiv:quant-ph/9801022 (1998) CrossRefADSGoogle Scholar
  13. H.-K. Lo, H.F. Chau. Science 283, 2050 (1999) ADSGoogle Scholar
  14. D. Mayers, A. Yao, arXiv:quant-ph/9809039 (1998); D. Mayers, C. Tourenne, “Violation of Locality and Self-Checking Source”, to appear in: Proceedings of Quantum Communication, Computing, and Measurement 3, held in Capri 2000 (Kluwer Academic/Plenum Publishers) Google Scholar
  15. C. Shannon, Bell Syst. Technical Jour. 28, 657 (1949) Google Scholar
  16. D. Welsh, Code and Cryptography (Clarendon Press, Oxford, 1988) Google Scholar
  17. D. Stinson, Cryptography: Theory and Practice (CRC Press, 1995) Google Scholar
  18. C.H. Bennett, G. Brassard, Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, December 1984, pp. 175–179 Google Scholar
  19. C.H. Bennett, F. Bessette, G. Brassard, L. Salvail, J. Smolin. J. Cryptology 5, 3 (1992) zbMATHGoogle Scholar
  20. D.F. Walls, G.J. Milburn, Quantum Optics (Springer, Berlin, 1994) Google Scholar
  21. M. Bourennane, F. Gibson, A. Karlsson, A. Hening, P. Jonsson, T. Tsegaye, D. Ljunggren, E. Sundberg, Opt. Expr. 4, 383 (1999) ADSCrossRefGoogle Scholar
  22. C. Marand, P.T. Townsend, Opt. Lett. 20, 1695 (1995) ADSCrossRefGoogle Scholar
  23. P.D. Townsend, IEEE Photon. Technol. Lett. 10, 1048 (1998) CrossRefADSGoogle Scholar
  24. A. Peres, Quantum Theory: Concepts and Methods (Kluwer, Dordrecht, 1993) Google Scholar
  25. Lectures on Communication Theory by D. Welsh, C. McDiarmid, Mathematical Institute, Oxford (1998) Google Scholar

Copyright information

© EDP Sciences/Società Italiana di Fisica/Springer-Verlag 2007

Authors and Affiliations

  1. 1.Centre for Quantum Computation, Clarendon LaboratoryOxfordUK
  2. 2.Helsinki Institute of PhysicsHelsinkiFinland
  3. 3.Computer Science Department, Maharishi University of ManagementNEC Research InstitutePrincetonUSA

Personalised recommendations