Security of quantum key distribution with imperfect devices
- D. Gottesman, H. Lo, N. Lütkenhaus, J. Preskill
- Computer ScienceInternational Symposium onInformation Theory…
- 11 December 2002
This paper prove the security of the Bennett-Brassard (BB84) quantum key distribution protocol in the case where the source and detector are under the limited control of an adversary. This proof…
The SECOQC quantum key distribution network in Vienna
- M. Peev, C. Pacher, A. Zeilinger
- Computer ScienceEuropean Conference on Optical Communication
- 22 March 2009
The paper presents the architecture and functionality of the principal networking agent—the SECOQC node module, which enables the authentic classical communication required for key distillation, manages the generated key material, determines a communication path between any destinations in the network, and realizes end-to-end secure transport of key material between these destinations.
Security against individual attacks for realistic quantum key distribution
- N. Lütkenhaus
- Computer Science
- 6 April 2000
A formula for the secure bit rate per time slot of an experimental setup is obtained which can be used to optimize the performance of existing schemes for the considered scenario.
Security aspects of practical quantum cryptography
- G. Brassard, N. Lütkenhaus, T. Mor, B. Sanders
- Computer ScienceConference Digest. International Quantum…
- 12 November 1999
This work provides a thorough investigation of security issues for practical quantum key distribution, taking into account channel losses, and a realistic detection process.
Optimal architectures for long distance quantum communication
- S. Muralidharan, Linshu Li, Jungsang Kim, N. Lütkenhaus, M. Lukin, Liang Jiang
- PhysicsScientific Reports
- 15 February 2016
This work provides a roadmap for the experimental realizations of highly efficient quantum networks over transcontinental distances by evaluating the cost of both temporal and physical resources, and identifying the optimized quantum repeater architecture for a given set of experimental parameters for use in quantum key distribution.
Numerical approach for unstructured quantum key distribution
A robust numerical approach is developed for calculating the key rate for arbitrary discrete-variable QKD protocols that will allow researchers to study ‘unstructured' protocols, that is, those that lack symmetry.
Squashing models for optical measurements in quantum communication.
It is shown that a measurement used in the Bennett-Brassard 1984 (BB84) protocol does allow a squashing description, although the corresponding six-state protocol measurement does not.
Unconditional security of practical quantum key distribution
This paper is identical to the preprint arXiv:quant-ph/0107017, which was finalized in 2001, therefore, some of the more recent developments, including the question of composability, are not addressed.
Quantum key distribution with realistic states: photon-number statistics in the photon-number splitting attack
Quantum key distribution can be performed with practical signal sources such as weak coherent pulses. One example of such a scheme is the Bennett-Brassard protocol that can be implemented via…
Continuous variable quantum cryptography: beating the 3 dB loss limit.
- C. Silberhorn, T. Ralph, N. Lütkenhaus, G. Leuchs
- Physics, Computer SciencePhysical Review Letters
- 11 April 2002
It is shown that, by an appropriate postselection mechanism, one can enter a region where Eve's knowledge on Alice's key falls behind the information shared between Alice and Bob, even in the presence of substantial losses.