BB84 is a quantum key distribution scheme developed by Charles Bennett and Gilles Brassard in 1984. It is the first quantum cryptography protocolâ€¦Â (More)

(More)

Semantic Scholar uses AI to extract papers important to this topic.

2011

2011

- Rahul Aggarwal, Heeren Sharma, Deepak Gupta
- 2011

Quantum Key Distribution (QKD) networks are the best application of quantum cryptography in which we use the principles ofâ€¦Â (More)

Is this relevant?

2010

2010

- Nur Hanani Kamarul Aizan, Zuriati Zukarnain, Hishamuddin Zainuddin
- 2010 Second International Conference on Networkâ€¦
- 2010

Quantum key distribution is a new method in key distribution system in cryptography used to transmit secret key between twoâ€¦Â (More)

Is this relevant?

2009

2009

- Patrick Bellot, Minh-Dung Dang
- 2009 IEEE-RIVF International Conference onâ€¦
- 2009

Quantum Key Distribution (QKD) principles and software implementations are now well-known. Focussing on CASCADE algorithm, aâ€¦Â (More)

Is this relevant?

2009

2009

- Xiao-yu Chen
- QuantumComm
- 2009

BB84 protocol of quantum key distribution had been proved to be absolutely secure. We simulate the rate of secure keyâ€¦Â (More)

Is this relevant?

2007

2007

- Maki Ohata, Kanta Matsuura
- 2007

Abstractâ€”In this paper, we propose how to simply construct a pair of linear codes for the BB84 quantum key distribution protocolâ€¦Â (More)

Is this relevant?

2006

2006

Electronic communication has become one of the main pillars of modern society and their ongoing boom requires the development ofâ€¦Â (More)

Is this relevant?

2005

2005

- S. Watanabe, Ryoji Matsumoto, R. Uyematsu
- Proceedings. International Symposium onâ€¦
- 2005

This paper shows that the BB84 protocol with random privacy amplification is secure with a higher key rate than Mayers' estimateâ€¦Â (More)

Is this relevant?

2002

2002

- Hitoshi Inamori
- Algorithmica
- 2002

Abstract. We propose a proof of the security of a practical BB84 quantum key distribution protocol against enemies with unlimitedâ€¦Â (More)

Is this relevant?

2001

2001

An undetected eavesdropping attack must produce count rate statistics that are indistinguishable from those that would arise inâ€¦Â (More)

Is this relevant?

Highly Cited

2000

Highly Cited

2000

We prove that the 1984 protocol of Bennett and Brassard (BB84) for quantum key distribution is secure. We first give a keyâ€¦Â (More)

Is this relevant?