Simple proof of the unconditional security of the Bennett 1992 quantum key distribution protocol

Z Quan, T Chaojing - Physical Review A, 2002 - APS
It is generally accepted that quantum key distribution (QKD) could supply legitimate users
with unconditional security during their communication. Quite a lot of satisfactory efforts have …

Quantum key distribution protocols

R Wolf, R Wolf - Quantum Key Distribution: An Introduction with …, 2021 - Springer
The goal of any quantum key distribution (QKD) protocol is to generate a shared secret key
between two distant parties over a public communication channel. The crucial point here is …

Quantum key distribution with authentication

G Zeng, X Wang - arXiv preprint quant-ph/9812022, 1998 - arxiv.org
The security of the previous quantum key distribution (QKD) protocols, which is guaranteed
by the nature of physics law, is based on the legitimate users. However, impersonation of the …

Security proof for a simplified Bennett-Brassard 1984 quantum-key-distribution protocol

D Rusca, A Boaron, M Curty, A Martin, H Zbinden - Physical Review A, 2018 - APS
The security of quantum key distribution (QKD) has been proven for different protocols, in
particular for the BB84 protocol. It has been shown that this scheme is robust against …

Quantum cryptography

HK Lo, Y Zhao - arXiv preprint arXiv:0803.2507, 2008 - arxiv.org
The best-known application of quantum cryptography is quantum key distribution (QKD). The
goal of QKD is to allow two distant participants, traditionally called Alice and Bob, to share a …

Security of the Bennett 1992 quantum-key distribution protocol against individual attack over a realistic channel

K Tamaki, M Koashi, N Imoto - Physical Review A, 2003 - APS
The security of two-state quantum-key distribution against individual attack is estimated
when the channel has losses and noises. We assume that Alice and Bob use two …

Unconditional security of practical quantum key distribution

H Inamori, N Lütkenhaus, D Mayers - The European Physical Journal D, 2007 - Springer
We present a complete protocol for BB84 quantum key distribution for a realistic setting
(noise, loss, multi-photon signals of the source) that covers many of todays experimental …

[PDF][PDF] Security of quantum cryptography with realistic sources

N Lütkenhaus - Acta Physica Slovaca, 1999 - Citeseer
In 1984 Bennett and Brassard [1] proposed the first protocol which allows to distribute a
cryptographic key such that the security of this distribution is guaranteed by quantum …

The security of practical quantum key distribution

V Scarani, H Bechmann-Pasquinucci, NJ Cerf… - Reviews of modern …, 2009 - APS
Quantum key distribution (QKD) is the first quantum information task to reach the level of
mature technology, already fit for commercialization. It aims at the creation of a secret key …

Quantum key distribution with an unknown and untrusted source

Y Zhao, B Qi, HK Lo - Physical Review A—Atomic, Molecular, and Optical …, 2008 - APS
The security of a standard bidirectional “plug-and-play” quantum key distribution (QKD)
system has been an open question for a long time. This is mainly because its source is …