Quantum circuits with mixed states
STOC '98 Proceedings of the thirtieth annual ACM symposium on Theory of computing
A proof of the security of quantum key distribution (extended abstract)
STOC '00 Proceedings of the thirty-second annual ACM symposium on Theory of computing
Quantum Key Distribution and String Oblivious Transfer in Noisy Channels
CRYPTO '96 Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology
Quantum Cryptography with Imperfect Apparatus
FOCS '98 Proceedings of the 39th Annual Symposium on Foundations of Computer Science
Efficient Quantum Key Distribution Scheme and a Proof of Its Unconditional Security
Journal of Cryptology
Proof of unconditional security of six-state quatum key distribution scheme
Quantum Information & Computation
Quantum state of a propagating laser field
Quantum Information & Computation
Linear-time encodable and decodable error-correcting codes
IEEE Transactions on Information Theory - Part 1
Proof of security of quantum key distribution with two-way classical communications
IEEE Transactions on Information Theory
IEEE Journal on Selected Areas in Communications - Special issue on optical wireless communications
Security of trusted repeater quantum key distribution networks
Journal of Computer Security - EU-Funded ICT Research on Trust and Security
Verification of Quantum Protocols with a Probabilistic Model-Checker
Electronic Notes in Theoretical Computer Science (ENTCS)
The relevance of quantum cryptography in modern networking systems
Neural, Parallel & Scientific Computations
Finite-key analysis for quantum key distribution with decoy states
Quantum Information & Computation
Security of a kind of quantum secret sharing with single photons
Quantum Information & Computation
Security of quantum key distribution with bit and basis dependent detector flaws
Quantum Information & Computation
Security of practical phase-coding quantum key distribution
Quantum Information & Computation
Some attacks on quantum-based cryptographic protocols
Quantum Information & Computation
Getting something out of nothing
Quantum Information & Computation
Time-shift attack in practical quantum cryptosystems
Quantum Information & Computation
Quantum Information & Computation
Security of quantum key distribution using weak coherent states with nonrandom phases
Quantum Information & Computation
Robust cryptography in the noisy-quantum-storage model
Quantum Information & Computation
Quantum Information & Computation
Upper bounds on the performance of differential-phase-shift quantum key distribution
Quantum Information & Computation
Security proof of quantum key distribution with detection efficiency mismatch
Quantum Information & Computation
Probabilistic quantum key distribution
Quantum Information & Computation
Security of quantum key distribution with state-dependent imperfections
Quantum Information & Computation
Security analysis of the time-coding quantum key distribution protocols
Quantum Information & Computation
Quantum Information & Computation
The security of SARG04 protocol in plug and play QKD system with an untrusted source
Quantum Information & Computation
Attacks on fixed apparatus quantum key distribution schemes
TPNC'12 Proceedings of the First international conference on Theory and Practice of Natural Computing
On the security of interferometric quantum key distribution
TPNC'12 Proceedings of the First international conference on Theory and Practice of Natural Computing
Bipartite coherent-state quantum key distribution with strong reference pulse
Quantum Information Processing
Quantum Information & Computation
Security of plug-and-play QKD arrangements with finite resources
Quantum Information & Computation
Asymmetric "4+2" protocol for quantum key distribution with finite resources
Quantum Information Processing
Key-leakage evaluation of authentication in quantum key distribution with finite resources
Quantum Information Processing
Security of high speed quantum key distribution with finite detector dead time
Quantum Information & Computation
Hi-index | 0.00 |
We prove the security of the Bennett-Brassard (BB84) quantum key distribution protocol in the case where the source and detector are under the limited control of an adversary. Our proof applies when both the source and the detector have small basis-dependent flaws, as is typical in practical implementations of the protocol. We derive a general lower bound on the asymptotic key generation rate for weakly basis-dependent eavesdropping attacks, and also estimate the rate in some special cases: sources that emit weak coherent states with random phases, detectors with basis-dependent efficiency, and misaligned sources and detectors.