General theory of decoy-state quantum cryptography with source errors

Physics – Quantum Physics

Scientific paper

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

Our results can be used securely for any source of diagonal states, including the Plug-&-Play protocol with whatever error pat

Scientific paper

10.1103/PhysRevA.77.042311

The existing theory of decoy-state quantum cryptography assumes the exact control of each states from Alice's source. Such exact control is impossible in practice. We develop the theory of decoy-state method so that it is unconditionally secure even there are state errors of sources, if the range of a few parameters in the states are known. This theory simplifies the practical implementation of the decoy-state quantum key distribution because the unconditional security can be achieved with a slightly shortened final key, even though the small errors of pulses are not corrected.

No associations

LandOfFree

Say what you really think

Search LandOfFree.com for scientists and scientific papers. Rate them and share your experience with other people.

Rating

General theory of decoy-state quantum cryptography with source errors does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.

If you have personal experience with General theory of decoy-state quantum cryptography with source errors, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and General theory of decoy-state quantum cryptography with source errors will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFWR-SCP-O-580320

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.