Editorial Board
Guidelines for Authors
QIC Online

Subscribers: to view the full text of a paper, click on the title of the paper. If you have any problem to access the full text, please check with your librarian or contact qic@rintonpress.com   To subscribe to QIC, please click Here.

Quantum Information and Computation     ISSN: 1533-7146      published since 2001
Vol.4 No.5 September 2004

Security of quantum key distribution with imperfect devices (pp325-360)
         D. Gottesman, H.-K. Lo, N. L\"utkenhaus, and J. Preskill
         
doi: https://doi.org/10.26421/QIC4.5-1

Abstracts: We prove the security of the Bennett-Brassard (BB84) quantum key distribution protocol in the case where the source and detector are under the limited control of an adversary. Our proof applies when both the source and the detector have small basis-dependent flaws, as is typical in practical implementations of the protocol. We derive a general lower bound on the asymptotic key generation rate for weakly basis-dependent eavesdropping attacks, and also estimate the rate in some special cases: sources that emit weak coherent states with random phases, detectors with basis-dependent efficiency, and misaligned sources and detectors.
Key words:  quantum cryptography, quantum key distribution

 

กก