Physics – Quantum Physics
Scientific paper
2008-02-21
Phys. Rev. A 77, 042311 (2008)
Physics
Quantum Physics
Our results can be used securely for any source of diagonal states, including the Plug-&-Play protocol with whatever error pat
Scientific paper
10.1103/PhysRevA.77.042311
The existing theory of decoy-state quantum cryptography assumes the exact control of each states from Alice's source. Such exact control is impossible in practice. We develop the theory of decoy-state method so that it is unconditionally secure even there are state errors of sources, if the range of a few parameters in the states are known. This theory simplifies the practical implementation of the decoy-state quantum key distribution because the unconditional security can be achieved with a slightly shortened final key, even though the small errors of pulses are not corrected.
Pan Jian-Wei
Peng Cheng-Zhi
Wang Xiang-Bin
Yang Lantian
Zhang James J.
No associations
LandOfFree
General theory of decoy-state quantum cryptography with source errors does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.
If you have personal experience with General theory of decoy-state quantum cryptography with source errors, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and General theory of decoy-state quantum cryptography with source errors will most certainly appreciate the feedback.
Profile ID: LFWR-SCP-O-580320