Proof of unconditional security of six-state quantum key distribution scheme

HK Lo - arXiv preprint quant-ph/0102138, 2001 - arxiv.org
We prove the unconditional security of the standard six-state scheme for quantum key
distribution (QKD). We demonstrate its unconditional security up to a bit error rate of 12.7 …

Proof of security of quantum key distribution with two-way classical communications

D Gottesman, HK Lo - IEEE Transactions on Information Theory, 2003 - ieeexplore.ieee.org
Shor and Preskill (see Phys. Rev. Lett., vol. 85, p. 441, 2000) have provided a simple proof
of security of the standard quantum key distribution scheme by Bennett and Brassard (1984) …

Security proof for a simplified Bennett-Brassard 1984 quantum-key-distribution protocol

D Rusca, A Boaron, M Curty, A Martin, H Zbinden - Physical Review A, 2018 - APS
The security of quantum key distribution (QKD) has been proven for different protocols, in
particular for the BB84 protocol. It has been shown that this scheme is robust against …

Simple security proof of quantum key distribution via uncertainty principle

M Koashi - arXiv preprint quant-ph/0505108, 2005 - arxiv.org
We present an approach to the unconditional security of quantum key distribution protocols
based on the uncertainty principle. The approach applies to every case that has been …

Efficient quantum key distribution scheme and a proof of its unconditional security

HK Lo, HF Chau, M Ardehali - Journal of Cryptology, 2005 - Springer
We devise a simple modification that essentially doubles the efficiency of the BB84 quantum
key distribution scheme proposed by Bennett and Brassard. We also prove the security of …

Security of quantum key distribution

R Renner - International Journal of Quantum Information, 2008 - World Scientific
Quantum Information Theory is an area of physics which studies both fundamental and
applied issues in quantum mechanics from an information-theoretical viewpoint. The …

On the information-splitting essence of two types of quantum key distribution protocols

F Gao, FZ Guo, QY Wen, FC Zhu - Physics Letters A, 2006 - Elsevier
With the help of a simple quantum key distribution (QKD) scheme, we discuss the relation
between BB84-type protocols and two-step-type ones. It is shown that they have the same …

Simple proof of security of the BB84 quantum key distribution protocol

PW Shor, J Preskill - Physical review letters, 2000 - APS
We prove that the 1984 protocol of Bennett and Brassard (BB84) for quantum key
distribution is secure. We first give a key distribution protocol based on entanglement …

Security proof for quantum key distribution using qudit systems

L Sheridan, V Scarani - Physical Review A—Atomic, Molecular, and Optical …, 2010 - APS
We provide security bounds against coherent attacks for two families of quantum key
distribution protocols that use d-dimensional quantum systems. In the asymptotic regime …

Unconditional security of practical quantum key distribution

H Inamori, N Lütkenhaus, D Mayers - The European Physical Journal D, 2007 - Springer
We present a complete protocol for BB84 quantum key distribution for a realistic setting
(noise, loss, multi-photon signals of the source) that covers many of todays experimental …