Security proof for a simplified Bennett-Brassard 1984 quantum-key-distribution protocol

D Rusca, A Boaron, M Curty, A Martin, H Zbinden - Physical Review A, 2018 - APS
The security of quantum key distribution (QKD) has been proven for different protocols, in
particular for the BB84 protocol. It has been shown that this scheme is robust against …

Quantum-key-distribution protocol with pseudorandom bases

AS Trushechkin, PA Tregubov, EO Kiktenko… - Physical Review A, 2018 - APS
Quantum key distribution (QKD) offers a way for establishing information-theoretical secure
communications. An important part of QKD technology is a high-quality random number …

Practical issues in quantum-key-distribution postprocessing

CHF Fung, X Ma, HF Chau - Physical Review A—Atomic, Molecular, and …, 2010 - APS
Quantum key distribution (QKD) is a secure key generation method between two distant
parties by wisely exploiting properties of quantum mechanics. In QKD, experimental …

Modified BB84 quantum key distribution protocol robust to source imperfections

M Pereira, G Currás-Lorenzo, Á Navarrete… - Physical Review …, 2023 - APS
The Bennett-Brassard 1984 (BB84) protocol is the most widely implemented quantum key
distribution (QKD) scheme. However, despite enormous theoretical and experimental efforts …

Security proof methods for quantum key distribution protocols

A Ferenczi - 2013 - uwspace.uwaterloo.ca
In this thesis we develop practical tools for quantum key distribution (QKD) security proofs.
We apply the tools to provide security proofs for several protocols, ranging from discrete …

On the information-splitting essence of two types of quantum key distribution protocols

F Gao, FZ Guo, QY Wen, FC Zhu - Physics Letters A, 2006 - Elsevier
With the help of a simple quantum key distribution (QKD) scheme, we discuss the relation
between BB84-type protocols and two-step-type ones. It is shown that they have the same …

Simple proof of the unconditional security of the Bennett 1992 quantum key distribution protocol

Z Quan, T Chaojing - Physical Review A, 2002 - APS
It is generally accepted that quantum key distribution (QKD) could supply legitimate users
with unconditional security during their communication. Quite a lot of satisfactory efforts have …

Security of the Bennett 1992 quantum-key distribution protocol against individual attack over a realistic channel

K Tamaki, M Koashi, N Imoto - Physical Review A, 2003 - APS
The security of two-state quantum-key distribution against individual attack is estimated
when the channel has losses and noises. We assume that Alice and Bob use two …

Proof of unconditional security of six-state quantum key distribution scheme

HK Lo - arXiv preprint quant-ph/0102138, 2001 - arxiv.org
We prove the unconditional security of the standard six-state scheme for quantum key
distribution (QKD). We demonstrate its unconditional security up to a bit error rate of 12.7 …

Parameter estimation with almost no public communication for continuous-variable quantum key distribution

C Lupo, C Ottaviani, P Papanastasiou, S Pirandola - Physical review letters, 2018 - APS
One crucial step in any quantum key distribution (QKD) scheme is parameter estimation. In a
typical QKD protocol the users have to sacrifice part of their raw data to estimate the …