Acknowledgements

We would like to mention that a major portion of this chapter has been borrowed from our previous publications: "Quantum Flows for Secret Key Distribution in the Presence of the Photon Number Splitting Attack" [5] and "Quantum Key Distribution in the Presence of the Intercept-Resend with Faked States Attack" [6].

[9] Xu F, Qi B, Lo H. Experimental demonstration of phase-remapping attack in a practical

Quantum Flows for Secret Key Distribution http://dx.doi.org/10.5772/intechopen.75964 61

[10] Makarov V, Hjelme DR. Faked states attack on quantum cryptosystems. Journal of Mod-

[11] Makarov V, Anisimov A, Skaar J. Effects of detector efficiency mismatch on security of

[12] Makarov V, Skaar J. Faked states attack using detector efficiency mismatch on SARG04, phase-time, DPSK, and Ekert protocols. Quantum Information and Computation. 2008;8:

[13] Qi B, Fung CF, Lo H, Ma X. Time-shift attack in practical quantum cryptosystems; 2005.

[14] Lydersen L, Wiechers C, Wittmann C, Elser D, Skaar J, Makarov V. Hacking commercial quantum cryptography systems by tailored bright illumination. Nature Photonics. 2010;4:

[15] Gerhardt I, Liu Q, Lamas-Linares A, Skaar J, Kurtsiefer C, Makarov V. Full-field implementation of a perfect eavesdropper on a quantum cryptography system. Nature Com-

[16] Wiechers C, Lydersen L, Wittmann C, Elser D, Skaar J, Marquardt C, Makarov V, Leuchs G. After-gate attack on a quantum cryptosystem. New Journal of Physics. 2011;13:013043

[17] Weier H, Krauss H, Rau M, Fuerst M, Nauerth S, Weinfurter H. Quantum eavesdropping without interception: An attack exploiting the dead time of single-photon detectors. New

[18] Ma X, Qi B, Zhao Y, Lo H. Practical decoy state for quantum key distribution. Physical

[20] Lo H, Curty M, Qi B. Measurement-device-independent quantum key distribution. Phys-

[21] Lunghi et al. Free-running single-photon detection based on a negative feedback InGaAs

[22] Gottesman D et al. Proof of security of quantum key distribution with two-way classical

[23] Shor P et al. Simple proof of security of the BB84 quantum key distribution protocol.

[24] Scarani V et al. The security of practical quantum key distribution. Reviews of Modern

communication. IEEE Transactions on Information Theory. 2003;49:457-475

[19] Hughes R, Nordholt J. Refining quantum cryptography. Science. 2011;333:1584-1586

quantum key distribution system. New Journal of Physics. 2010;12:113026

quantum cryptosystems. Physical Review A. 2006;74:022313

ern Optics. 2005;52:691-705

arXiv:quant-ph/0512080

munications. 2011;2:349

Journal of Physics. 2011;13:073024

ical Review Letters. 2012;108:130503

Physical Review Letters. 2000;85:441

Physics. 2009;81:1301

APD. Journal of Modern Optics. 2012;59:1481-1488

Review A. 2005;72:012326

622-635

686-689
