
Quantum Key Distribution Q 711
Security Against General Attacks A QKD protocol
is said to be secure against general attacks if it is secure on
any arbitrary channel
Q. This type of security is sometimes
also called full or unconditional security as it does not rely
on any assumptions on the type of attacks or the resources
needed by an adversary.
The first QKD protocol to be proved secure against
general attacks was the BB84 protocol. The original argu-
ment by Mayers [11] was followed by various alternative
proofs. Most notably, based on a connection to the prob-
lem of entanglement purification [4] established by Lo and
Chau [10], Shor and Preskill [14] presented a general argu-
ment which applies to various versions of the BB84 proto-
col.
More recently it has been shown that, for virtually
any QKD protocol, security against collective attacks im-
plies security against general attacks [12]. In particular,
the above statement about the security of QKD protocols
against collective attacks, including formula 2 for the key
rate, extends to security against general attacks.
Applications
Because the notion of security described above is com-
posable [13](see[1,12] for a general discussion of com-
posability of QKD) the key generated by a secure QKD
protocol can in principle be used within any application
that requires a secret key (such as one-time pad encryp-
tion). More precisely, let
A be a scheme which, when us-
ing a perfect key S (i. e., a uniformly distributed bitstring
which is independent of the adversary’s knowledge), has
some failure probability ı (according to some arbitrary
failure criterion). Then, if the perfect key S is replaced by
the key generated by an "-secure QKD protocol, the failure
probability of
A is bounded by ı + " [13].
Experimental Resul t s
Most known QKD protocols (including BB84) only re-
quire relatively simple quantum operations on Alice and
Bob’s side (e. g., preparing a two-level quantum system in
a given state or measuring the state of such a system). This
makes it possible to realize them with today’s technology.
Experimental implementations of QKD protocols usually
use photons as carriers of quantum information, because
they can easily be transmitted (e. g., through optical fibers).
A main limitation, however, is noise in the transmission,
which, with increasing distance between Alice and Bob, re-
duces the performance of the protocol (see Fig. 2). We re-
fer to [9] for an overview on quantum cryptography with
a focus on experimental aspects.
Cross References
Quantum Error Correction
Teleportation of Quantum States
Recommended Reading
1. Ben-Or,M.,Horodecki,M.,Leung,D.W.,Mayers,D.,Oppen-
heim, J.: The universal composable security of quantum key
distribution. In: Second Theory of Cryptography Conference
TCC. Lecture Notes in Computer Science, vol. 3378, pp. 386–
406. Springer, Berlin (2005). Also available at http://arxiv.org/
abs/quant-ph/0409078
2. Bennett, C.H., Brassard, G.: Quantum cryptography: Public-key
distribution and coin tossing. In: Proceedings of IEEE Interna-
tional Conference on Computers, Systems and Signal Process-
ing, pp. 175–179. IEEE Computer Society Press, Los Alamitos
(1984)
3. Bennett, C.H., Brassard, G., Crépeau, C., Maurer, U.: Generalized
privacy amplification. IEEE Trans. Inf. Theory 41(6), 1915–1923
(1995)
4. Bennett, C.H., Brassard, G., Popescu, S., Schumacher, B., Smolin,
J., Wootters, W.: Purificationof noisy entanglement and faithful
teleportation via noisy channels. Phys. Rev. Lett. 76, 722–726
(1996)
5. Csiszár, I., Körner, J.: Broadcast channels with confidential mes-
sages. IEEE Trans. Inf. Theory 24, 339–348 (1978)
6. Devetak, I., Winter, A.: Distillation of secret key and entangle-
ment from quantum states. Proc. R. Soc. Lond. A 461, 207–235
(2005)
7. Ekert, A.K.: Quantum cryptography based on Bell’s theorem.
Phys. Rev. Lett. 67, 661–663 (1991)
8. Fuchs, C.A., Gisin, N., Griffiths, R.B., Niu, C., Peres, A.: Opti-
mal eavesdropping in quantum cryptography, I. Information
bound and optimal strategy. Phys. Rev. A 56, 1163–1172 (1997)
9. Gisin,N.,Ribordy,G.,Tittel,W.,Zbinden,H.:Quantumcryptog-
raphy. Rev. Mod. Phys. 74, 145–195 (2002)
10. Lo, H.-K., Chau, H.F.: Unconditional security of quantum key
distribution over arbitrarily long distances. Science 283, 2050–
2056 (1999)
11. Mayers, D.: Quantum key distribution and string oblivious
transfer in noisy channels. In: Advances in Cryptology –
CRYPTO ’96. Lecture Notes in Computer Science, vol. 1109,
pp. 343–357. Springer (1996)
12. Renner, R.: Security of Quantum Key Distribution. Ph. D. thesis,
Swiss Federal Institute of Technology (ETH) Zurich, Also avail-
able at http://arxiv.org/abs/quant-ph/0512258 (2005)
13. Renner, R., König, R.:Universally composable privacy amplifica-
tion against quantum adversaries. In: Second Theory of Cryp-
tography Conference TCC. Lecture Notes in Computer Science,
vol. 3378, pp. 407–425. Springer, Berlin (2005). Also available at
http://arxiv.org/abs/quant-ph/0403133
14. Shor, P.W., Preskill, J.: Simple proof of security of the BB84
quantum key distribution protocol. Phys. Rev. Lett. 85, 441
(2000)
15. Wegman, M.N., Carter, J.L.: New hash functions and their
use in authentication and set equality. J. Comput. Syst. Sci.
22, 265–279 (1981)
16. Wiesner, S.: Conjugate coding. Sigact News 15(1), 78–88 (1983)