OSA's Digital Library

Applied Optics

Applied Optics


  • Vol. 37, Iss. 14 — May. 10, 1998
  • pp: 2869–2878

Defense frontier analysis of quantum cryptographic systems

Boris Slutsky, Ramesh Rao, Pan-Cheng Sun, Ljubiša Tancevski, and Shaya Fainman  »View Author Affiliations

Applied Optics, Vol. 37, Issue 14, pp. 2869-2878 (1998)

View Full Text Article

Enhanced HTML    Acrobat PDF (261 KB)

Browse Journals / Lookup Meetings

Browse by Journal and Year


Lookup Conference Papers

Close Browse Journals / Lookup Meetings

Article Tools



When a quantum cryptographic system operates in the presence of background noise, security of the key can be recovered by a procedure called key distillation. A key-distillation scheme effective against so-called individual (bitwise-independent) eavesdropping attacks involves sacrifice of some of the data through privacy amplification. We derive the amount of data sacrifice sufficient to defend against individual eavesdropping attacks in both BB84 and B92 protocols and show in what sense the communication becomes secure as a result. We also compare the secrecy capacity of various quantum cryptosystems, taking into account data sacrifice during key distillation, and conclude that the BB84 protocol may offer better performance characteristics than the B92.

© 1998 Optical Society of America

OCIS Codes
(060.4510) Fiber optics and optical communications : Optical communications
(270.0270) Quantum optics : Quantum optics

Original Manuscript: August 11, 1997
Revised Manuscript: January 5, 1998
Published: May 10, 1998

Boris Slutsky, Ramesh Rao, Pan-Cheng Sun, Ljubiša Tancevski, and Shaya Fainman, "Defense frontier analysis of quantum cryptographic systems," Appl. Opt. 37, 2869-2878 (1998)

Sort:  Author  |  Year  |  Journal  |  Reset  


  1. C. H. Bennett, G. Brassard, “Quantum cryptography: public key distribution and coin tossing,” in Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing (IEEE, New York, 1984), pp. 175–179.
  2. A. K. Ekert, “Quantum cryptography based on Bell’s theorem,” Phys. Rev. Lett. 67, 661–663 (1991). [CrossRef] [PubMed]
  3. C. H. Bennett, G. Brassard, N. D. Mermin, “Quantum cryptography without Bell’s theorem,” Phys. Rev. Lett. 68, 557–559 (1992). [CrossRef] [PubMed]
  4. C. H. Bennett, F. Bessette, G. Brassard, L. Salvail, J. Smolin, “Experimental quantum cryptography,” J. Cryptol. 5, 3–28 (1992). [CrossRef]
  5. C. H. Bennett, “Quantum cryptography using any two nonorthogonal states,” Phys. Rev. Lett. 68, 3121–3124 (1992). [CrossRef] [PubMed]
  6. B. Slutsky, P. C. Sun, Y. Mazurenko, R. Rao, Y. Fainaman, “Effect of channel imperfection on the secrecy capacity of a quantum cryptographic system,” J. Mod. Opt. 44, 953–961 (1997). [CrossRef]
  7. E. Biham, T. Mor, “Security of quantum cryptography against collective attacks,” Phys. Rev. Lett. 78, 2256–2259 (1997). [CrossRef]
  8. E. Biham, T. Mor, “Bounds on information and the security of quantum cryptography,” Phys. Rev. Lett 79, 4034–4037 (1997). [CrossRef]
  9. D. Mayers, “Quantum key distribution and string oblivious transfer in noisy channels,” in Advances in Cryptology, CRYPTO’96, N. Kobitz, ed., Vol. 1109 of Springer Lecture Notes in Computer Science Series (Springer, New York, 1996), pp. 343–357.
  10. Inconclusive bits are those whose value is not revealed with certainty by Bob’s measurement, for example, those measured in the wrong BB84 basis by Bob.1 Inconclusive bits are an integral feature of quantum cryptographic protocols, even in the absence of channel and detector imperfections.
  11. C. H. Bennett, G. Brassard, C. Crepeau, U. M. Maurer, “Generalized privacy amplification,” IEEE Trans. Inf. Theory 41, 1915–1923 (1995). [CrossRef]
  12. B. Huttner, N. Imoto, N. Gisin, T. Mor, “Quantum cryptography with coherent states,” Phys. Rev. A 51, 1863–1869 (1995). [CrossRef] [PubMed]
  13. H. Yuen, “Quantum amplifiers, quantum duplicators, and quantum cryptography,” Quantum Semiclass. Opt. 8, 939–949 (1996). [CrossRef]
  14. This condition is unavoidable because a perfect single-photon state is fundamentally impossible to prepare (although a good approximation can be produced with phenomena such as parametric downconversion).
  15. Strictly speaking, the total number of multiphoton bit cells is a Gaussian random variable, and only its average and variance are determined. Still, based on these parameters, it can be bounded from above with any desired confidence level.
  16. C. Cachin, U. M. Maurer, “Linking information reconciliation and privacy amplification,” J. Cryptol. 10, 97–110 (1997). [CrossRef]
  17. C. A. Fuchs, A. Peres, “Quantum-state disturbance versus information gain: uncertainty relations for quantum information,” Phys. Rev. A 53, 2038–2045 (1996). [CrossRef] [PubMed]
  18. C. A. Fuchs, N. Gisin, R. B. Griffiths, C.-S. Niu, A. Peres, “Optimal eavesdropping in quantum cryptography. I. Information bound and optimal strategy,” Phys. Rev. A 56, 1163–1172 (1997). [CrossRef]
  19. B. Slutsky, R. Rao, P.-C. Sun, Y. Fainman, “Security of quantum cryptography against individual attacks,” Phys. Rev. A (to be published).
  20. A. K. Ekert, B. Huttner, G. M. Palma, A. Peres, “Eavesdropping on quantum cryptographical systems,” Phys. Rev. A 50, 1047–1056 (1994). [CrossRef] [PubMed]
  21. Eve cannot use group information such as block checksums, revealed later in the protocol, because, by assumption, she must attack each bit independently of other bits.
  22. The B92 curves in Fig. 5 are qualitatively similar to those in Fig. 4 of Ref. 20, although the latter are computed based on a suboptimal family of eavesdropping strategies and with Shannon rather than Renyi entropy.
  23. Because individual bits are transmitted and received independently of one another, errors are distributed uniformly throughout raw data, regardless of the quantum cryptosystem used.

Cited By

Alert me when this paper is cited

OSA is able to provide readers links to articles that cite this paper by participating in CrossRef's Cited-By Linking service. CrossRef includes content from more than 3000 publishers and societies. In addition to listing OSA journal articles that cite this paper, citing articles from other participating publishers will also be listed.


Fig. 1 Fig. 2 Fig. 3
Fig. 4 Fig. 5

« Previous Article  |  Next Article »

OSA is a member of CrossRef.

CrossCheck Deposited