{ "id": "quant-ph/0506246", "version": "v1", "published": "2005-06-29T04:43:04.000Z", "updated": "2005-06-29T04:43:04.000Z", "title": "Security proof of practical quantum key distribution schemes", "authors": [ "Yodai Watanabe" ], "comment": "5 pages, no figures", "categories": [ "quant-ph" ], "abstract": "This paper provides a security proof of the Bennett-Brassard (BB84) quantum key distribution protocol in practical implementation. To prove the security, it is not assumed that defects in the devices are absorbed into an adversary's attack. In fact, the only assumption in the proof is that the source is characterized. The proof is performed by lower-bounding adversary's Renyi entropy about the key before privacy amplification. The bound reveals the leading factors reducing the key generation rate.", "revisions": [ { "version": "v1", "updated": "2005-06-29T04:43:04.000Z" } ], "analyses": { "keywords": [ "security proof", "distribution schemes", "practical quantum", "lower-bounding adversarys renyi entropy", "distribution protocol" ], "note": { "typesetting": "TeX", "pages": 5, "language": "en", "license": "arXiv", "status": "editable", "adsabs": "2005quant.ph..6246W" } } }