We prove the unconditional security of a quantum key distribution protocol in which bit values are encoded in the phase of a weak coherent-state pulse relative to a strong …
We provide limits to practical quantum key distribution, taking into account channel losses, a realistic detection process, and imperfections in the “qubits” sent from the sender to the …
H Inamori, N Lütkenhaus, D Mayers - The European Physical Journal D, 2007 - Springer
We present a complete protocol for BB84 quantum key distribution for a realistic setting (noise, loss, multi-photon signals of the source) that covers many of todays experimental …
P Jouguet, S Kunz-Jacques, E Diamanti… - Physical Review A …, 2012 - APS
As quantum key distribution becomes a mature technology, it appears clearly that some assumptions made in the security proofs cannot be justified in practical implementations …
We propose a decoy-pulse method to overcome the photon-number-splitting attack for Bennett-Brassard 1984 quantum key distribution protocol in the presence of high loss: A …
We prove the security of the Bennett-Brassard (BB84) quantum key distribution protocol in the case where the key information is encoded in the relative phase of a coherent-state …
L Sheridan, TP Le, V Scarani - New Journal of Physics, 2010 - iopscience.iop.org
Abstract Christandl et al (2009 Phys. Rev. Lett. 102 020504) provide, in particular, the possibility of studying unconditional security in the finite-key regime for all discrete-variable …
We consider the security of the Bennett-Brassard 1984 protocol for quantum key distribution, with arbitrary individual imperfections simultaneously in the source and detectors. We …
We present and demonstrate a new protocol for practical quantum cryptography, tailored for an implementation with weak coherent pulses to obtain a high key generation rate. The key …