Security against individual attacks for realistic quantum key distribution

N Lütkenhaus - Physical Review A, 2000 - APS
I prove the security of quantum key distribution against individual attacks for realistic signals
sources, including weak coherent pulses and down-conversion sources. The proof applies …

Unconditional Security of Coherent-State Quantum Key Distribution<? format?> with a Strong Phase-Reference Pulse

M Koashi - Physical review letters, 2004 - APS
We prove the unconditional security of a quantum key distribution protocol in which bit
values are encoded in the phase of a weak coherent-state pulse relative to a strong …

Limitations on practical quantum cryptography

G Brassard, N Lütkenhaus, T Mor, BC Sanders - Physical review letters, 2000 - APS
We provide limits to practical quantum key distribution, taking into account channel losses, a
realistic detection process, and imperfections in the “qubits” sent from the sender to the …

Unconditional security of practical quantum key distribution

H Inamori, N Lütkenhaus, D Mayers - The European Physical Journal D, 2007 - Springer
We present a complete protocol for BB84 quantum key distribution for a realistic setting
(noise, loss, multi-photon signals of the source) that covers many of todays experimental …

Analysis of imperfections in practical continuous-variable quantum key distribution

P Jouguet, S Kunz-Jacques, E Diamanti… - Physical Review A …, 2012 - APS
As quantum key distribution becomes a mature technology, it appears clearly that some
assumptions made in the security proofs cannot be justified in practical implementations …

Quantum key distribution with high loss: toward global secure communication

WY Hwang - Physical review letters, 2003 - APS
We propose a decoy-pulse method to overcome the photon-number-splitting attack for
Bennett-Brassard 1984 quantum key distribution protocol in the presence of high loss: A …

Security of quantum key distribution using weak coherent states with nonrandom phases

HK Lo, J Preskill - arXiv preprint quant-ph/0610203, 2006 - arxiv.org
We prove the security of the Bennett-Brassard (BB84) quantum key distribution protocol in
the case where the key information is encoded in the relative phase of a coherent-state …

Finite-key security against coherent attacks in quantum key distribution

L Sheridan, TP Le, V Scarani - New Journal of Physics, 2010 - iopscience.iop.org
Abstract Christandl et al (2009 Phys. Rev. Lett. 102 020504) provide, in particular, the
possibility of studying unconditional security in the finite-key regime for all discrete-variable …

Security of quantum key distribution with arbitrary individual imperfections

Ø Marøy, L Lydersen, J Skaar - Physical Review A—Atomic, Molecular, and …, 2010 - APS
We consider the security of the Bennett-Brassard 1984 protocol for quantum key distribution,
with arbitrary individual imperfections simultaneously in the source and detectors. We …

Fast and simple one-way quantum key distribution

D Stucki, N Brunner, N Gisin, V Scarani… - Applied Physics …, 2005 - pubs.aip.org
We present and demonstrate a new protocol for practical quantum cryptography, tailored for
an implementation with weak coherent pulses to obtain a high key generation rate. The key …