Security of quantum key distribution with imperfect devices
(pp325-360)
D. Gottesman, H.-K. Lo,
N. L\"utkenhaus, and J. Preskill
doi:
https://doi.org/10.26421/QIC4.5-1
Abstracts:
We prove the security of the Bennett-Brassard (BB84)
quantum key distribution protocol in the case where the source and
detector are under the limited control of an adversary. Our proof
applies when both the source and the detector have small basis-dependent
flaws, as is typical in practical implementations of the protocol. We
derive a general lower bound on the asymptotic key generation rate for
weakly basis-dependent eavesdropping attacks, and also estimate the rate
in some special cases: sources that emit weak coherent states with
random phases, detectors with basis-dependent efficiency, and misaligned
sources and detectors.
Key words:
quantum cryptography, quantum key distribution |