The Case for Quantum Key Distribution

@article{Stebila2009TheCF,
  title={The Case for Quantum Key Distribution},
  author={Douglas Stebila and Michele Mosca and Norbert L{\"u}tkenhaus},
  journal={IACR Cryptol. ePrint Arch.},
  year={2009},
  volume={2009},
  pages={82},
  url={https://api.semanticscholar.org/CorpusID:457259}
}
It is argued that QKD will be an important part of future cryptographic infrastructures because it can provide long-term confidentiality for encrypted information without reliance on computational assumptions.

Quantum Key Distribution: A Secure Key Exchange Method in Quantum Cryptography

This paper provides a detailed study of Quantum Key Distribution (QKD), which permits the secure delivery of encryption keys between two parties as an adversary cannot eavesdrop without being detected.

Quantum Key Distribution in the Classical Authenticated Key Exchange Framework

Key establishment is a crucial primitive for building secure channels in a multi-party setting and since digital communication can be easily eavesdropped and recorded, it is important to consider the secrecy of information anticipating future algorithmic and computational discoveries which could break the confidentiality of past keys.

Quantum key distribution and cryptography: a survey

I will try to partially answer, based on a review on recent work, the following question: Can QKD and more generally quantum information be useful to cover some practical security requirements in

Quantum Key Distribution Without Sifting

A novel quantum key distribution protocol that uses AES to expand an initial secret, allowing us to individually authenticate every qubit, with tags that are efficient to construct, ideal for real-world implementations that use encryption schemes other than the one-time pad.

A Survey and Comparison of Some of the Most Prominent QKD Protocols

This paper surveys some of the most prominent QKD protocols proposed till now, and then a comparative analysis on those protocols depending on various factors is performed.

Quantum cryptography beyond quantum key distribution

This review article, aimed primarily at cryptographers unfamiliar with the quantum world, survey the area of theoretical quantum cryptography, with an emphasis on the constructions and limitations beyond the realm of QKD.

Quantum Key Distribution: A Resource Letter

The most prominent QKD protocols present in the literature are surveyed from theoretical initialization by Wiesner to the attempts at practical implementations.

A New Spin on Quantum Cryptography: Avoiding Trapdoors and Embracing Public Keys

We give new arguments in support of signed quantum key establishment, where quantum cryptography is used in a public-key infrastructure that provides the required authentication. We also analyze more
...

Quantum cryptography: a practical information security perspective

This paper presents a systematic comparison of QKE with traditional key establishment protocols in realistic secure communication systems and shows that QKE is vulnerable to man-in-the-middle attacks.

Why Quantum Cryptography

This paper presents a systematic comparison of QKE with traditional key exchange protocols in realistic secure communication systems and shows that QKE is vulnerable to man-in-the-middle attacks.

Security of trusted repeater quantum key distribution networks

This paper presents an example of a trusted repeater QKD network, developed within the SECOQC project, and proposes an original method, able to ensure the authenticity and privacy of the generated secret keys.

The security of practical quantum key distribution

Essential theoretical tools that have been developed to assess the security of the main experimental platforms are presented (discrete- variable, continuous-variable, and distributed-phase-reference protocols).

No signaling and quantum key distribution.

A key distribution scheme provably secure against general attacks by a postquantum eavesdropper limited only by the impossibility of superluminal signaling is described, which stems from violation of a Bell inequality.

Unconditional security of quantum key distribution over arbitrarily long distances

The problem is solved by showing that, given fault-tolerant quantum computers, quantum key distribution over an arbitrarily long distance of a realistic noisy channel can be made unconditionally secure.

Unconditionally secure quantum bit commitment is impossible

It is shown that the claim that quantum cryptography can provide protocols that are unconditionally secure, that is, for which the security does not depend on any restriction on the time, space, or technology available to the cheaters, does not hold for any quantum bit commitment protocol.

Device-independent security of quantum cryptography against collective attacks.

The main result is a tight bound on the Holevo information between one of the authorized parties and the eavesdropper, as a function of the amount of violation of a Bell-type inequality.

Device-independent quantum key distribution secure against collective attacks

This proof exploits the full structure of quantum theory, but only holds against collective attacks, where the eavesdropper is assumed to act on the quantum systems of the honest parties independently and identically in each round of the protocol.

Security of quantum key distribution with imperfect devices

This paper prove the security of the Bennett-Brassard (BB84) quantum key distribution protocol in the case where the source and detector are under the limited control of an adversary. This proof