## Security of quantum key distribution with imperfect devices

*Gottesman, Daniel*;

*Lo, Hoi-Kwong*;

*Lütkenhaus, Norbert*;

*Preskill, John*;

- Subject:arxiv: Computer Science::Cryptography and Security | Physics::Instrumentation and Detectors | Quantum Physics

- References (33)
[1] C. H. Bennett and G. Brassard, “Quantum cryptography: Public key distribution and coin tossing,” in Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India (IEEE, New York, 1984), pp. 175-179.

[2] D. Mayers, “Quantum key distribution and string oblivious transfer in noisy channels,” in Advances in Cryptography-Proceedings of Crypto'96 (SpringerVerlag, New York, 1996), pp. 343-357; “Unconditional security in quantum cryptography,” J. Assoc. Comp. Mach. 48, 351 (2001), arXiv:quant-ph/9802025.

[3] H.-K. Lo and H. F. Chau, “Unconditional security of quantum key distribution over arbitrarily long distances,” Science 283, 2050-2056 (1999), arXiv:quantph/9803006.

[4] E. Biham, M. Boyer, P. O. Boykin, T. Mor, and V. Roychowdhury, “A proof of the security of quantum key distribution,” in Proceedings of the 32nd Annual ACM Symposium on Theory of Computing (ACM Press, New York, 2000), pp. 715-724, arXiv:quant-ph/9912053.

[5] P. W. Shor and J. Preskill, “Simple proof of security of the BB84 quantum key distribution protocol,” Phys. Rev. Lett. 85, 441-444 (2000), arXiv:quantph/0003004.

[6] M. Koashi and J. Preskill, “Secure quantum key distribution with an uncharacterized source,” Phys. Rev. Lett. 90, 057902 (2003), arXiv:quant-ph/0208155 (2002).

[7] D. Mayers and A. Yao, “Quantum cryptography with imperfect apparatus,” arXiv:quant-ph/9809039 (1998); D. Mayers and A. Yao, “Self testing quantum apparatus,” arXiv:quant-ph/0307205.

[8] H. Inamori, N. Lu¨tkenhaus and D. Mayers, “Unconditional security of practical quantum key distribution,” arXiv:quant-ph/0107017 (2001).

[9] B. A. Slutsky, R. Rao, P.-C. Sun, and Y. Fainman, “Security of quantum cryptography against individual attacks,” Phys. Rev. A 57, 2383-2398 (1998).

[10] N. Lu¨tkenhaus, “Security against individual attacks for realistic quantum key distribution,” Phys. Rev. A 61, 052304 (2000), arXiv:quant-ph/9910093.

- Similar Research Results (8)
- Metrics No metrics available

- Download from

- Funded by

- Cite this publication