Abstract

Quantum key distribution (QKD) permits information-theoretically secure transmission of digital encryption keys, assuming that the behaviour of the devices employed for the key exchange can be reliably modelled and predicted. Remarkably, no assumptions have to be made on the capabilities of an eavesdropper other than that she is bounded by the laws of Nature, thus making the security of QKD "unconditional". However, unconditional security is hard to achieve in practice. For example, any experimental realisation can only collect finite data samples, leading to vulnerabilities against coherent attacks, the most general class of attacks, and for some protocols the theoretical proof of robustness against these attacks is still missing. For these reasons, in the past many QKD experiments have fallen short of implementing an unconditionally secure protocol and have instead considered limited attacking capabilities by the eavesdropper. Here, we explore the security of QKD against coherent attacks in the most challenging environment: the long-distance transmission of keys. We demonstrate that the BB84 protocol can provide positive key rates for distances up to 240 km without multiplexing of conventional signals, and up to 200 km with multiplexing. Useful key rates can be achieved even for the longest distances, using practical thermo-electrically cooled single-photon detectors.

Highlights

  • Quantum key distribution (QKD) permits information-theoretically secure transmission of digital encryption keys, assuming that the behaviour of the devices employed for the key exchange can be reliably modelled and predicted

  • Translating the exceptional properties of QKD-enabled unconditionally secure key exchange [1,2,3] into practice requires a rigorous approach to all aspects of the involved protocol and hardware [4,5,6,7]

  • Any QKD system aiming to implement an unconditionally secure protocol has to be proven secure against coherent attacks

Read more

Summary

Introduction

Quantum key distribution (QKD) permits information-theoretically secure transmission of digital encryption keys, assuming that the behaviour of the devices employed for the key exchange can be reliably modelled and predicted. Collective and coherent attacks against the BB84 protocol [2] are known to coincide in the asymptotic limit, whereas they can provide different secure key transmission rates in the finite-size case [30]. Most QKD experiments have fallen short of the target to demonstrate security against coherent attacks in the finite size regime [31,32,33,34,35,36,37].

Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call