File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Conference Paper: Security of quantum key distribution with imperfect devices

TitleSecurity of quantum key distribution with imperfect devices
Authors
Issue Date2004
Citation
IEEE International Symposium on Information Theory - Proceedings, 2004, p. 136 How to Cite?
AbstractWe prove the security of the Bennett-Brassard (BB84) quantum key distribution protocol in the case where the source and detector are under the limited control of an adversary. Our proof applies when both the source and the detector have small basis-dependent flaws, as is typical in practical implementations of the protocol. We estimate the key generation rate in some special cases: sources that emit weak coherent states, detectors with basis-dependent efficiency, and misaligned sources and detectors.
Persistent Identifierhttp://hdl.handle.net/10722/285630
ISSN

 

DC FieldValueLanguage
dc.contributor.authorGottesman, Daniel-
dc.contributor.authorLo, Hoi Kwong-
dc.contributor.authorLütkenhaus, Norbert-
dc.contributor.authorPreskill, John-
dc.date.accessioned2020-08-18T04:56:14Z-
dc.date.available2020-08-18T04:56:14Z-
dc.date.issued2004-
dc.identifier.citationIEEE International Symposium on Information Theory - Proceedings, 2004, p. 136-
dc.identifier.issn2157-8097-
dc.identifier.urihttp://hdl.handle.net/10722/285630-
dc.description.abstractWe prove the security of the Bennett-Brassard (BB84) quantum key distribution protocol in the case where the source and detector are under the limited control of an adversary. Our proof applies when both the source and the detector have small basis-dependent flaws, as is typical in practical implementations of the protocol. We estimate the key generation rate in some special cases: sources that emit weak coherent states, detectors with basis-dependent efficiency, and misaligned sources and detectors.-
dc.languageeng-
dc.relation.ispartofIEEE International Symposium on Information Theory - Proceedings-
dc.titleSecurity of quantum key distribution with imperfect devices-
dc.typeConference_Paper-
dc.description.naturelink_to_subscribed_fulltext-
dc.identifier.scopuseid_2-s2.0-5044247468-
dc.identifier.spage136-
dc.identifier.epage-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats