arXiv Analytics

Sign in

arXiv:quant-ph/0506246AbstractReferencesReviewsResources

Security proof of practical quantum key distribution schemes

Yodai Watanabe

Published 2005-06-29Version 1

This paper provides a security proof of the Bennett-Brassard (BB84) quantum key distribution protocol in practical implementation. To prove the security, it is not assumed that defects in the devices are absorbed into an adversary's attack. In fact, the only assumption in the proof is that the source is characterized. The proof is performed by lower-bounding adversary's Renyi entropy about the key before privacy amplification. The bound reveals the leading factors reducing the key generation rate.

Related articles: Most relevant | Search more
arXiv:1412.0282 [quant-ph] (Published 2014-11-30)
Security Proof of a Semi-Quantum Key Distribution Protocol
arXiv:quant-ph/0607056 (Published 2006-07-08, updated 2006-09-20)
Security proof of a three-state quantum key distribution protocol without rotational symmetry
arXiv:quant-ph/0510144 (Published 2005-10-18, updated 2006-01-11)
Quantum Authentication and Quantum Key Distribution Protocol