{ "id": "quant-ph/9912053", "version": "v1", "published": "1999-12-11T04:58:11.000Z", "updated": "1999-12-11T04:58:11.000Z", "title": "A Proof of the Security of Quantum Key Distribution", "authors": [ "Eli Biham", "Michel Boyer", "P. Oscar Boykin", "Tal Mor", "Vwani Roychowdhury" ], "categories": [ "quant-ph" ], "abstract": "We prove the security of quantum key distribution against the most general attacks which can be performed on the channel, by an eavesdropper who has unlimited computation abilities, and the full power allowed by the rules of classical and quantum physics. A key created that way can then be used to transmit secure messages in a way that their security is also unaffected in the future.", "revisions": [ { "version": "v1", "updated": "1999-12-11T04:58:11.000Z" } ], "analyses": { "keywords": [ "distribution", "transmit secure messages", "unlimited computation abilities", "general attacks", "full power" ], "note": { "typesetting": "TeX", "pages": 0, "language": "en", "license": "arXiv", "status": "editable", "adsabs": "1999quant.ph.12053B" } } }