Security of the Bennett 1992 quantum-key distribution protocol against individual attack over a realistic channel

K Tamaki, M Koashi, N Imoto - Physical Review A, 2003 - APS
The security of two-state quantum-key distribution against individual attack is estimated
when the channel has losses and noises. We assume that Alice and Bob use two …

[PDF][PDF] Security of the Bennett 1992 quantum-key distribution against individual attack over a realistic channel

K Tamaki, M Koashi, N Imoto - arXiv preprint quant-ph/0212161 - scholar.archive.org
Quantum key distribution (QKD) is a way to share between the sender, Alice, and the
receiver, Bob, a secret key whose information is not known to the eavesdropper, Eve. Since …

Security of the Bennett 1992 quantum-key distribution protocol against individual attack over a realistic channel

K Tamaki, M Koashi, N Imoto - Physical Review A …, 2003 - u-toyama.elsevierpure.com
A formula that estimates Eve's maximum information when Alice and Bob perform the B92
protocol using two nonorthogonal single-photon polarization states was derived. It was …

Security of the Bennett 1992 quantum-key distribution protocol against individual attack over a realistic channel

K Tamaki, M Koashi, N Imoto - Physical Review. A, 2003 - osti.gov
The security of two-state quantum-key distribution against individual attack is estimated
when the channel has losses and noises. We assume that Alice and Bob use two …

Security of the Bennett 1992 quantum-key distribution protocol against individual attack over a realistic channel

K Tamaki, M Koashi, N Imoto - Physical Review A, 2003 - ui.adsabs.harvard.edu
The security of two-state quantum-key distribution against individual attack is estimated
when the channel has losses and noises. We assume that Alice and Bob use two …

Security of the Bennett 1992 quantum-key distribution protocol against individual attack over a realistic channel

K Tamaki, M Koashi, N Imoto - Physical Review. A, 2003 - inis.iaea.org
[en] The security of two-state quantum-key distribution against individual attack is estimated
when the channel has losses and noises. We assume that Alice and Bob use two …

Security of the Bennett 1992 quantum-key distribution against individual attack over a realistic channel

K Tamaki, M Koashi, N Imoto - arXiv preprint quant-ph/0212161, 2002 - arxiv.org
The security of two-state quantum key distribution against individual attack is estimated
when the channel has losses and noises. We assume that Alice and Bob use two …

Security of the Bennett 1992 quantum-key distribution protocol against individual attack over a realistic channel

K Tamaki, M Koashi, N Imoto - Physical Review A …, 2003 - u-toyama.elsevierpure.com
The security of two-state quantum-key distribution against individual attack is estimated
when the channel has losses and noises. We assume that Alice and Bob use two …

[引用][C] Security of the Bennett 1992 quantum-key distribution protocol against individual attack over a realistic channel

K TAMAKI, M KOASHI, N IMOTO - Physical review. A, 2003 - American Physical Society