DocumentCode :
2053111
Title :
Security of quantum key distribution with imperfect devices
Author :
Gottesman, Daniel ; Lo, Hoi-Kwong ; Lütkenhaus, Norbert ; Preskill, John
Author_Institution :
Perimeter Inst., Waterloo, Canada
fYear :
2004
fDate :
27 June-2 July 2004
Firstpage :
136
Abstract :
This paper prove the security of the Bennett-Brassard (BB84) quantum key distribution protocol in the case where the source and detector are under the limited control of an adversary. This proof applies when both the source and the detector have small basis-dependent flaws, as is typical in practical implementations of the protocol. The estimation of the key generation rate in some special cases: sources that emit weak coherent states, detectors with basis-dependent efficiency, and misaligned sources and detectors.
Keywords :
protocols; quantum cryptography; telecommunication security; Bennett-Brassard security; basis-dependent efficiency; coherent state; detector; key generation rate; quantum key distribution protocol; Cryptographic protocols; Cryptography; Detectors; Distributed computing; Electronic mail; Error analysis; Information security; Physics; Quantum computing; Technological innovation;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Theory, 2004. ISIT 2004. Proceedings. International Symposium on
Print_ISBN :
0-7803-8280-3
Type :
conf
DOI :
10.1109/ISIT.2004.1365172
Filename :
1365172
Link To Document :
بازگشت