Security against individual attacks for realistic quantum key distribution -: art. no. 052304

被引:0
|
作者
Lütkenhaus, N [1 ]
机构
[1] Helsinki Inst Phys, FIN-00014 Helsinki, Finland
关键词
D O I
10.1103/physreva.61.052304
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
I prove the security of quantum key distribution against individual attacks for realistic signals sources, including weak coherent pulses and down-conversion sources. The proof applies to the Bennett-Brassard 1984 protocol with the standard detection scheme (no strong reference pulse). I obtain a formula for the secure bit rare per time slot of an experimental setup, which can be used to optimize the performance of existing schemes for the considered scenario.
引用
收藏
页数:10
相关论文
共 50 条
  • [31] Quantum key distribution against Trojan horse attacks
    Cai Qing-Yu
    Lv Hua
    CHINESE PHYSICS LETTERS, 2007, 24 (05) : 1154 - 1157
  • [32] Continuous Variable Quantum Key Distribution: Finite-Key Analysis of Composable Security against Coherent Attacks
    Furrer, F.
    Franz, T.
    Berta, M.
    Leverrier, A.
    Scholz, V. B.
    Tomamichel, M.
    Werner, R. F.
    PHYSICAL REVIEW LETTERS, 2012, 109 (10)
  • [33] Security of quantum key distribution with arbitrary individual imperfections
    Maroy, Oystein
    Lydersen, Lars
    Skaar, Johannes
    PHYSICAL REVIEW A, 2010, 82 (03):
  • [34] Improved finite-key security analysis of quantum key distribution against Trojan-horse attacks
    Navarrete, Alvaro
    Curty, Marcos
    QUANTUM SCIENCE AND TECHNOLOGY, 2022, 7 (03)
  • [35] Inherent security of phase coding quantum key distribution systems against detector blinding attacks
    Balygin, K. A.
    Klimov, A. N.
    Bobrov, B.
    Kravtsov, K. S.
    Kulik, S. P.
    Molotkov, S. N.
    LASER PHYSICS LETTERS, 2018, 15 (09)
  • [36] The study of single photon detector for quantum key distribution - art. no. 68270E
    Wei, Zhengjun
    Wang, Jindong
    Li, Kaizhen
    Zhou, Peng
    Liao, Changjun
    Guo, Jianping
    Liu, Songhao
    QUANTUM OPTICS, OPTICAL DATA STORAGE, AND ADVANCED MICROLITHOGRAPHY, 2008, 6827 : E8270 - E8270
  • [37] Detecting two-party quantum correlations in quantum-key-distribution protocols -: art. no. 022306
    Curty, M
    Gühne, O
    Lewenstein, M
    Lütkenhaus, N
    PHYSICAL REVIEW A, 2005, 71 (02):
  • [38] Realistic constraints on photonic quantum interferometry - art. no. 69060H
    Gilbert, Gerald
    Hamrick, Michael
    Weinstein, Yaakov S.
    QUANTUM ELECTRONICS METROLOGY, 2008, 6906 : H9060 - H9060
  • [39] The symmetries of the Dirac-Pauli equation in two and three dimensions -: art. no. 052304
    Adam, C
    Sánchez-Guillén, J
    JOURNAL OF MATHEMATICAL PHYSICS, 2005, 46 (05)
  • [40] On the optimality of individual entangling-probe attacks against BB84 quantum key distribution
    Herbauts, I. M.
    Bettelli, S.
    Huebel, H.
    Peev, M.
    EUROPEAN PHYSICAL JOURNAL D, 2008, 46 (02): : 395 - 406