Title :
Security of quantum key distribution with imperfect devices
Author :
Gottesman, Daniel ; Lo, Hoi-Kwong ; Lütkenhaus, Norbert ; Preskill, John
Author_Institution :
Perimeter Inst., Waterloo, Canada
fDate :
27 June-2 July 2004
Abstract :
This paper prove the security of the Bennett-Brassard (BB84) quantum key distribution protocol in the case where the source and detector are under the limited control of an adversary. This proof applies when both the source and the detector have small basis-dependent flaws, as is typical in practical implementations of the protocol. The estimation of the key generation rate in some special cases: sources that emit weak coherent states, detectors with basis-dependent efficiency, and misaligned sources and detectors.
Keywords :
protocols; quantum cryptography; telecommunication security; Bennett-Brassard security; basis-dependent efficiency; coherent state; detector; key generation rate; quantum key distribution protocol; Cryptographic protocols; Cryptography; Detectors; Distributed computing; Electronic mail; Error analysis; Information security; Physics; Quantum computing; Technological innovation;
Conference_Titel :
Information Theory, 2004. ISIT 2004. Proceedings. International Symposium on
Print_ISBN :
0-7803-8280-3
DOI :
10.1109/ISIT.2004.1365172