Security proof methods for quantum key distribution protocols

A Ferenczi - 2013 - uwspace.uwaterloo.ca
In this thesis we develop practical tools for quantum key distribution (QKD) security proofs.
We apply the tools to provide security proofs for several protocols, ranging from discrete …

Quantum key distribution with mismatched measurements over arbitrary channels

WO Krawec - arXiv preprint arXiv:1608.07728, 2016 - arxiv.org
In this paper, we derive key-rate expressions for different quantum key distribution protocols.
Our key-rate equations utilize multiple channel statistics, including those gathered from …

Security proof of practical quantum key distribution with detection-efficiency mismatch

Y Zhang, PJ Coles, A Winick, J Lin, N Lütkenhaus - Physical Review Research, 2021 - APS
Quantum key distribution (QKD) protocols with threshold detectors are driving high-
performance QKD demonstrations. The corresponding security proofs usually assume that …

Security bounds for quantum cryptography with finite resources

V Scarani, R Renner - Workshop on Quantum Computation …, 2008 - Springer
A practical quantum key distribution (QKD) protocol necessarily runs in finite time and,
hence, only a finite amount of communication is exchanged. This is in contrast to most of the …

Cryptographic security of quantum key distribution

C Portmann, R Renner - arXiv preprint arXiv:1409.3525, 2014 - arxiv.org
This work is intended as an introduction to cryptographic security and a motivation for the
widely used Quantum Key Distribution (QKD) security definition. We review the notion of …

Numerical approach for unstructured quantum key distribution

PJ Coles, EM Metodiev, N Lütkenhaus - Nature communications, 2016 - nature.com
Quantum key distribution (QKD) allows for communication with security guaranteed by
quantum theory. The main theoretical problem in QKD is to calculate the secret key rate for a …

Quantum Key Distribution with Basis-Dependent Detection Probability

F Grasselli, G Chesi, N Walk, H Kampermann… - arXiv preprint arXiv …, 2024 - arxiv.org
Quantum Key Distribution (QKD) is a promising technology for secure communication.
Nevertheless, QKD is still treated with caution in certain contexts due to potential gaps …

Theoretical study of continuous-variable quantum key distribution

A Leverrier - 2009 - pastel.hal.science
This thesis is concerned with quantum key distribution (QKD), a cryptographic primitive
allowing two distant parties, Alice and Bob, to establish a secret key, in spite of the presence …

Security proof for a simplified Bennett-Brassard 1984 quantum-key-distribution protocol

D Rusca, A Boaron, M Curty, A Martin, H Zbinden - Physical Review A, 2018 - APS
The security of quantum key distribution (QKD) has been proven for different protocols, in
particular for the BB84 protocol. It has been shown that this scheme is robust against …

Essential elements lacking in security proofs for quantum key distribution

HP Yuen - Emerging Technologies in Security and Defence; …, 2013 - spiedigitallibrary.org
All the currently available unconditional security proofs on quantum key distribution, in
particular for the BB84 protocol and its variants including continuous-variable ones, are …