Unconditional security in quantum cryptography
Journal of the ACM (JACM)
Quantum Cryptography with Imperfect Apparatus
FOCS '98 Proceedings of the 39th Annual Symposium on Foundations of Computer Science
Elements of Information Theory (Wiley Series in Telecommunications and Signal Processing)
Elements of Information Theory (Wiley Series in Telecommunications and Signal Processing)
Generalized self-testing and the security of the 6-state protocol
TQC'10 Proceedings of the 5th conference on Theory of quantum computation, communication, and cryptography
Security of quantum key distribution with imperfect devices
Quantum Information & Computation
Proof of security of quantum key distribution with two-way classical communications
IEEE Transactions on Information Theory
Hi-index | 0.00 |
Security proofs of quantum key distribution (QKD) often require post-processing schemes to simplify the data structure, and hence the security proof. We show a generic method to improve resulting secure key rates by partially reversing the simplifying post-processing for error correction purposes. We apply our method to the security analysis of deviceindependent QKD schemes and of detection-device-independent QKD schemes, where in both cases one is typically required to assign binary values even to lost signals. In the device-independent case, the loss tolerance threshold is cut down by our method from 92.4% to 90.9%. The lowest tolerable transmittance of the detection-device-independent scheme can be improved from 78.0% to 65.9%.