arXiv:quant-ph/0506246AbstractReferencesReviewsResources
Security proof of practical quantum key distribution schemes
Published 2005-06-29Version 1
This paper provides a security proof of the Bennett-Brassard (BB84) quantum key distribution protocol in practical implementation. To prove the security, it is not assumed that defects in the devices are absorbed into an adversary's attack. In fact, the only assumption in the proof is that the source is characterized. The proof is performed by lower-bounding adversary's Renyi entropy about the key before privacy amplification. The bound reveals the leading factors reducing the key generation rate.
Comments: 5 pages, no figures
Categories: quant-ph
Related articles: Most relevant | Search more
arXiv:1412.0282 [quant-ph] (Published 2014-11-30)
Security Proof of a Semi-Quantum Key Distribution Protocol
Security proof of a three-state quantum key distribution protocol without rotational symmetry
Quantum Authentication and Quantum Key Distribution Protocol