arxiv: Computer Science::Cryptography and Security | Physics::Instrumentation and Detectors | Quantum Physics
We prove the security of the Bennett-Brassard (BB84) quantum key distribution protocol in the case where the source and detector are under the limited control of an adversary. Our proof applies when both the source and the detector have small basis-dependent flaws, as i... View more
 C. H. Bennett and G. Brassard, “Quantum cryptography: Public key distribution and coin tossing,” in Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India (IEEE, New York, 1984), pp. 175-179.
 D. Mayers, “Quantum key distribution and string oblivious transfer in noisy channels,” in Advances in Cryptography-Proceedings of Crypto'96 (SpringerVerlag, New York, 1996), pp. 343-357; “Unconditional security in quantum cryptography,” J. Assoc. Comp. Mach. 48, 351 (2001), arXiv:quant-ph/9802025.
 H.-K. Lo and H. F. Chau, “Unconditional security of quantum key distribution over arbitrarily long distances,” Science 283, 2050-2056 (1999), arXiv:quantph/9803006.
 E. Biham, M. Boyer, P. O. Boykin, T. Mor, and V. Roychowdhury, “A proof of the security of quantum key distribution,” in Proceedings of the 32nd Annual ACM Symposium on Theory of Computing (ACM Press, New York, 2000), pp. 715-724, arXiv:quant-ph/9912053.
 P. W. Shor and J. Preskill, “Simple proof of security of the BB84 quantum key distribution protocol,” Phys. Rev. Lett. 85, 441-444 (2000), arXiv:quantph/0003004.
 M. Koashi and J. Preskill, “Secure quantum key distribution with an uncharacterized source,” Phys. Rev. Lett. 90, 057902 (2003), arXiv:quant-ph/0208155 (2002).
 D. Mayers and A. Yao, “Quantum cryptography with imperfect apparatus,” arXiv:quant-ph/9809039 (1998); D. Mayers and A. Yao, “Self testing quantum apparatus,” arXiv:quant-ph/0307205.
 H. Inamori, N. Lu¨tkenhaus and D. Mayers, “Unconditional security of practical quantum key distribution,” arXiv:quant-ph/0107017 (2001).
 B. A. Slutsky, R. Rao, P.-C. Sun, and Y. Fainman, “Security of quantum cryptography against individual attacks,” Phys. Rev. A 57, 2383-2398 (1998).
 N. Lu¨tkenhaus, “Security against individual attacks for realistic quantum key distribution,” Phys. Rev. A 61, 052304 (2000), arXiv:quant-ph/9910093.