Unconditional security in quantum cryptography
Journal of the ACM (JACM)
Quantum Key Distribution and String Oblivious Transfer in Noisy Channels
CRYPTO '96 Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology
Security of quantum key distribution with imperfect devices
Quantum Information & Computation
Time-shift attack in practical quantum cryptosystems
Quantum Information & Computation
Security of quantum key distribution using weak coherent states with nonrandom phases
Quantum Information & Computation
Quantum Information & Computation
Security proof of quantum key distribution with detection efficiency mismatch
Quantum Information & Computation
The universal composable security of quantum key distribution
TCC'05 Proceedings of the Second international conference on Theory of Cryptography
Universally composable privacy amplification against quantum adversaries
TCC'05 Proceedings of the Second international conference on Theory of Cryptography
The security of SARG04 protocol in plug and play QKD system with an untrusted source
Quantum Information & Computation
Key-leakage evaluation of authentication in quantum key distribution with finite resources
Quantum Information Processing
Hi-index | 0.00 |
We consider the security of the Bennett-Brassard 1984 (BB84) protocol for QuantumKey Distribution (QKD), in the presence of bit and basis dependent detector flaws. Wesuggest a powerful attack that can be used in systems with detector efficiency mismatch,even if the detector assignments are chosen randomly by Bob. A security proof is pro-vided, valid for any basis dependent, possibly lossy, linear optical imperfections in thechannel/receiver/detectors. The proof does not assume the so-called squashing detectormodel.