Unconditional security of practical quantum key distribution

H Inamori, N Lütkenhaus, D Mayers - The European Physical Journal D, 2007 - Springer
We present a complete protocol for BB84 quantum key distribution for a realistic setting
(noise, loss, multi-photon signals of the source) that covers many of todays experimental …

Security of quantum key distribution using weak coherent states with nonrandom phases

HK Lo, J Preskill - arXiv preprint quant-ph/0610203, 2006 - arxiv.org
We prove the security of the Bennett-Brassard (BB84) quantum key distribution protocol in
the case where the key information is encoded in the relative phase of a coherent-state …

Security against individual attacks for realistic quantum key distribution

N Lütkenhaus - Physical Review A, 2000 - APS
I prove the security of quantum key distribution against individual attacks for realistic signals
sources, including weak coherent pulses and down-conversion sources. The proof applies …

Analysis of imperfections in practical continuous-variable quantum key distribution

P Jouguet, S Kunz-Jacques, E Diamanti… - Physical Review A …, 2012 - APS
As quantum key distribution becomes a mature technology, it appears clearly that some
assumptions made in the security proofs cannot be justified in practical implementations …

Efficient quantum key distribution scheme and a proof of its unconditional security

HK Lo, HF Chau, M Ardehali - Journal of Cryptology, 2005 - Springer
We devise a simple modification that essentially doubles the efficiency of the BB84 quantum
key distribution scheme proposed by Bennett and Brassard. We also prove the security of …

Security proof for a simplified Bennett-Brassard 1984 quantum-key-distribution protocol

D Rusca, A Boaron, M Curty, A Martin, H Zbinden - Physical Review A, 2018 - APS
The security of quantum key distribution (QKD) has been proven for different protocols, in
particular for the BB84 protocol. It has been shown that this scheme is robust against …

The security of practical quantum key distribution

V Scarani, H Bechmann-Pasquinucci, NJ Cerf… - Reviews of modern …, 2009 - APS
Quantum key distribution (QKD) is the first quantum information task to reach the level of
mature technology, already fit for commercialization. It aims at the creation of a secret key …

Security bounds for continuous variables quantum key distribution

M Navascués, A Acín - Physical review letters, 2005 - APS
Security bounds for key distribution protocols using coherent and squeezed states and
homodyne measurements are presented. These bounds refer to (i) general attacks and (ii) …

Security of quantum key distribution with entangled photons against individual attacks

E Waks, A Zeevi, Y Yamamoto - Physical Review A, 2002 - APS
We investigate the security of quantum key distribution with entangled photons, focusing on
the two-photon variation of the Bennett-Brassard 1984 (BB84) protocol proposed in 1992 by …

[PDF][PDF] A proof of the security of quantum key distribution

E Biham, M Boyer, PO Boykin, T Mor… - Proceedings of the …, 2000 - dl.acm.org
We prove the security of theoretical quantum key distribution against the most general
attacks which can be performed on the channel, by an eavesdropper who has unlimited …