File Download
There are no files associated with this item.
Supplementary
-
Citations:
- Scopus: 0
- Appears in Collections:
Conference Paper: Security of quantum key distribution with imperfect devices
Title | Security of quantum key distribution with imperfect devices |
---|---|
Authors | |
Issue Date | 2004 |
Citation | IEEE International Symposium on Information Theory - Proceedings, 2004, p. 136 How to Cite? |
Abstract | We prove the security of the Bennett-Brassard (BB84) quantum key distribution protocol in the case where the source and detector are under the limited control of an adversary. Our proof applies when both the source and the detector have small basis-dependent flaws, as is typical in practical implementations of the protocol. We estimate the key generation rate in some special cases: sources that emit weak coherent states, detectors with basis-dependent efficiency, and misaligned sources and detectors. |
Persistent Identifier | http://hdl.handle.net/10722/285630 |
ISSN |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Gottesman, Daniel | - |
dc.contributor.author | Lo, Hoi Kwong | - |
dc.contributor.author | Lütkenhaus, Norbert | - |
dc.contributor.author | Preskill, John | - |
dc.date.accessioned | 2020-08-18T04:56:14Z | - |
dc.date.available | 2020-08-18T04:56:14Z | - |
dc.date.issued | 2004 | - |
dc.identifier.citation | IEEE International Symposium on Information Theory - Proceedings, 2004, p. 136 | - |
dc.identifier.issn | 2157-8097 | - |
dc.identifier.uri | http://hdl.handle.net/10722/285630 | - |
dc.description.abstract | We prove the security of the Bennett-Brassard (BB84) quantum key distribution protocol in the case where the source and detector are under the limited control of an adversary. Our proof applies when both the source and the detector have small basis-dependent flaws, as is typical in practical implementations of the protocol. We estimate the key generation rate in some special cases: sources that emit weak coherent states, detectors with basis-dependent efficiency, and misaligned sources and detectors. | - |
dc.language | eng | - |
dc.relation.ispartof | IEEE International Symposium on Information Theory - Proceedings | - |
dc.title | Security of quantum key distribution with imperfect devices | - |
dc.type | Conference_Paper | - |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.scopus | eid_2-s2.0-5044247468 | - |
dc.identifier.spage | 136 | - |
dc.identifier.epage | - |