A new class of quantum cryptography (QC) protocols that are robust against the most general photon number splitting attacks in a weak coherent pulse implementation has been recently proposed. In this article we give a quite exhaustive analysis of several eavesdropping attacks on these schemes. The eavesdropper (Eve) is supposed to have unlimited technological power while the honest parties (Alice and Bob) use present day technology, in particular an attenuated laser as an approximation of a single-photon source. They exploit the nonorthogonality of quantum states for decreasing the information accessible to Eve in the multi-photon pulses accidentally produced by the imperfect source. An implementation of some of these protocols using presen...
We propose a quantum key distribution scheme by using screening angles and analyzing detectors which...
Practical photon sources are weak coherent sources so that multiphoton pulses are inevitable. In ord...
Physical implementations of quantum key distribution (QKD) protocols, like the Bennett-Brassard (BB8...
A new class of quantum cryptography (QC) protocols that are robust against the most general photon n...
Coherent-pulse implementations of quantum cryptography protocols resistant to photon-number-splittin...
We introduce a new class of quantum key distribution protocols, tailored to be robust against photon...
We report here a complete experimental realization of one-way decoy-pulse quantum key distribution, ...
We analyze the application of bright reference pulses to prevent the photon-number-splitting attack ...
The theoretical existence of photon-number-splitting attacks creates a security loophole for most qu...
Quantum cryptography or quantum key distribution (QKD) applies fundamental laws of quantum physics t...
Quantum cryptography or quantum key distribution (QKD) applies fundamental laws of quantum physics t...
We apply the techniques introduced in [Kraus et. al., Phys. Rev. Lett. 95, 080501, 2005] to prove se...
Practical implementations of quantum cryptography use attenuated laser pulses as the signal source r...
We prove the security of the Bennett-Brassard (BB84) quantum key distribution protocol in the case w...
We consider the security of a system of quantum key distribution (QKD) using only practical devices....
We propose a quantum key distribution scheme by using screening angles and analyzing detectors which...
Practical photon sources are weak coherent sources so that multiphoton pulses are inevitable. In ord...
Physical implementations of quantum key distribution (QKD) protocols, like the Bennett-Brassard (BB8...
A new class of quantum cryptography (QC) protocols that are robust against the most general photon n...
Coherent-pulse implementations of quantum cryptography protocols resistant to photon-number-splittin...
We introduce a new class of quantum key distribution protocols, tailored to be robust against photon...
We report here a complete experimental realization of one-way decoy-pulse quantum key distribution, ...
We analyze the application of bright reference pulses to prevent the photon-number-splitting attack ...
The theoretical existence of photon-number-splitting attacks creates a security loophole for most qu...
Quantum cryptography or quantum key distribution (QKD) applies fundamental laws of quantum physics t...
Quantum cryptography or quantum key distribution (QKD) applies fundamental laws of quantum physics t...
We apply the techniques introduced in [Kraus et. al., Phys. Rev. Lett. 95, 080501, 2005] to prove se...
Practical implementations of quantum cryptography use attenuated laser pulses as the signal source r...
We prove the security of the Bennett-Brassard (BB84) quantum key distribution protocol in the case w...
We consider the security of a system of quantum key distribution (QKD) using only practical devices....
We propose a quantum key distribution scheme by using screening angles and analyzing detectors which...
Practical photon sources are weak coherent sources so that multiphoton pulses are inevitable. In ord...
Physical implementations of quantum key distribution (QKD) protocols, like the Bennett-Brassard (BB8...