Physics – Quantum Physics
Scientific paper
2002-12-11
Quant.Inf.Comput. 5 (2004) 325-360
Physics
Quantum Physics
22 pages. (v3): Minor changes. (v2): Extensively revised and expanded. New results include a security proof for generic small
Scientific paper
We prove the security of the Bennett-Brassard (BB84) quantum key distribution protocol in the case where the source and detector are under the limited control of an adversary. Our proof applies when both the source and the detector have small basis-dependent flaws, as is typical in practical implementations of the protocol. We derive a general lower bound on the asymptotic key generation rate for weakly basis-dependent eavesdropping attacks, and also estimate the rate in some special cases: sources that emit weak coherent states with random phases, detectors with basis-dependent efficiency, and misaligned sources and detectors.
Gottesman Daniel
Lo Hoi-Kwong
Lütkenhaus Norbert
Preskill John
No associations
LandOfFree
Security of quantum key distribution with imperfect devices does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.
If you have personal experience with Security of quantum key distribution with imperfect devices, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Security of quantum key distribution with imperfect devices will most certainly appreciate the feedback.
Profile ID: LFWR-SCP-O-638215