Skip to main content

Theory of Quantum Key Distribution: The Road Ahead (Invited Talk)

  • Conference paper
Information Theoretic Security (ICITS 2008)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 5155))

Included in the following conference series:

  • 621 Accesses

Abstract

Quantum Key Distribution (QKD) has been an area with lots of research activity. So nearly 25 years after the publication of the Bennett-Brassard 1984 protocol, what is left to do? As a basis of my talk, I will present the ideas of quantum key distribution in a language that emphasizes the common basis with information theoretic secure key distribution schemes that are based on independent noise assumptions in channels. As I will show, the role quantum theory plays is to verify the nature of correlations between sender, receiver and eavesdropper based only on the observations of sender and receiver. For reviews of practical QKD and issues addressed in this presentation, see [1,2,3].

Current research directions concentrate on the theoretic side on the optimal method of extracting secret key out of given observed correlations between sender and receiver. As it is the case in the classical scenario, different protocols using for example one-way or two-way communication over an authenticated public channel can have different maximum thresholds for error rates, and can yield different key rates. Other research directions deal with side channels and imperfections that are unavoidable in the implementation of the QKD protocols. After all, in implementations we are not sending ’qubits’, the quantum equivalent of classical bits, but real optical signals that have a rich internal structure.

As for applications, it is desirable to go beyond the simple point-to-point QKD connection and I will present research done within the European Consortium SECOQC [4] that builds a network demonstrator using trusted repeater stations in Vienna. This demonstrator involves the development of optical technology for the QKD implementation, but also the development of key management structures and routing protocols that are compatible with high-security application scenarios.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Lütkenhaus, N.: Secret keys from quantum correlations. Informatik - Forschung und Entwicklung 21, 29–37 (2006)

    Article  Google Scholar 

  2. Lo, H.K., Lütkenhaus, N.: Quantum cryptography: from theory to practice. Physics in Canada 63, 191–196 (2007)

    Google Scholar 

  3. Scarani, V., Bechmann-Pasquinucci, H., Cerf, N.J., Dušek, M., Lütkenhaus, N., Peev, M.: A framework for practical quantum cryptography, http://arxiv.org/abs/quant-ph/0802.4155

  4. http://www.secoqc.net

Download references

Author information

Authors and Affiliations

Authors

Editor information

Reihaneh Safavi-Naini

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lütkenhaus, N. (2008). Theory of Quantum Key Distribution: The Road Ahead (Invited Talk) . In: Safavi-Naini, R. (eds) Information Theoretic Security. ICITS 2008. Lecture Notes in Computer Science, vol 5155. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-85093-9_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-85093-9_13

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-85092-2

  • Online ISBN: 978-3-540-85093-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics