Security of quantum key distribution with imperfect devices

Physics – Quantum Physics

Scientific paper

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

22 pages. (v3): Minor changes. (v2): Extensively revised and expanded. New results include a security proof for generic small

Scientific paper

We prove the security of the Bennett-Brassard (BB84) quantum key distribution protocol in the case where the source and detector are under the limited control of an adversary. Our proof applies when both the source and the detector have small basis-dependent flaws, as is typical in practical implementations of the protocol. We derive a general lower bound on the asymptotic key generation rate for weakly basis-dependent eavesdropping attacks, and also estimate the rate in some special cases: sources that emit weak coherent states with random phases, detectors with basis-dependent efficiency, and misaligned sources and detectors.

No associations

LandOfFree

Say what you really think

Search LandOfFree.com for scientists and scientific papers. Rate them and share your experience with other people.

Rating

Security of quantum key distribution with imperfect devices does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.

If you have personal experience with Security of quantum key distribution with imperfect devices, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Security of quantum key distribution with imperfect devices will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFWR-SCP-O-638215

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.