Unconditional security of practical quantum key distribution

被引:1
作者
H. Inamori
N. Lütkenhaus
D. Mayers
机构
[1] Centre for Quantum Computation,Computer Science Department, Maharishi University of Management
[2] Clarendon Laboratory,undefined
[3] Helsinki Institute of Physics,undefined
[4] NEC Research Institute,undefined
来源
The European Physical Journal D | 2007年 / 41卷
关键词
03.67.Dd Quantum cryptography; 21.20.Kd Quantum key distribution; 22.70.+S Security proofs;
D O I
暂无
中图分类号
学科分类号
摘要
We present a complete protocol for BB84 quantum key distribution for a realistic setting (noise, loss, multi-photon signals of the source) that covers many of todays experimental implementations. The security of this protocol is shown against an eavesdropper having unrestricted power to manipulate the signals coherently on their path from sender to receiver. The protocol and the security proof take into account the effects concerning the finite size of the generated key. This paper is identical to the preprint arXiv:quant-ph/0107017, which was finalized in 2001. Therefore, some of the more recent developments, including the question of composability, are not addressed.
引用
收藏
相关论文
共 14 条
[1]  
Huttner undefined(1995)undefined Phys. Rev. A 51 1863-undefined
[2]  
Yuen undefined(1996)undefined Quantum Semiclassic. Opt. 8 939-undefined
[3]  
Brassard undefined(2000)undefined Phys. Rev. Lett. 85 1330-undefined
[4]  
Lütkenhaus undefined(2000)undefined Phys. Rev. A 61 052304-undefined
[5]  
Shor undefined(2000)undefined Phys. Rev. Lett. 85 441-undefined
[6]  
Huttner undefined(1994)undefined J. Mod. Opt. 41 2455-undefined
[7]  
Cirac undefined(1997)undefined Phys. Lett. A 229 1-undefined
[8]  
Biham undefined(1997)undefined Phys. Rev. Lett. 78 2256-undefined
[9]  
Lo undefined(1999)undefined H.F. Chau. Science 283 2050-undefined
[10]  
Shannon undefined(1949)undefined Bell Syst. Technical Jour. 28 657-undefined