DocumentCode
2935173
Title
A Simple Method for Security Proof of Decoy States QKD with Finite Resources
Author
Hong-Wei Li ; Shuang Wang ; Wan-su Bao ; Zheng-Fu Han
Author_Institution
Key Lab. of Quantum Inf., Univ. of Sci. & Technol. of China, Hefei, China
fYear
2010
fDate
19-21 June 2010
Firstpage
1
Lastpage
4
Abstract
Security proof of practical quantum key distribution with finite resources has attracted a lot of attentions in recent years. We give a security analysis about finite resources QKD in this paper, our method is much simper comparing with previous security analysis in finite resources case,the simulation result shows that the security analysis is reasonable in practical QKD realizations with finite resources.
Keywords
quantum cryptography; security of data; QKD; decoy states; finite resources; quantum key distribution; security proof; Analytical models; Distributed computing; Error analysis; Fluctuations; Information security; Laboratories; Physics computing; Protocols; Quantum computing; Secure storage;
fLanguage
English
Publisher
ieee
Conference_Titel
Photonics and Optoelectronic (SOPO), 2010 Symposium on
Conference_Location
Chengdu
Print_ISBN
978-1-4244-4963-7
Electronic_ISBN
978-1-4244-4964-4
Type
conf
DOI
10.1109/SOPO.2010.5504024
Filename
5504024
Link To Document