Finite-key security analysis of quantum key distribution with imperfect light sources
From MaRDI portal
Publication:5136090
DOI10.1088/1367-2630/17/9/093011zbMath1448.81288arXiv1504.08151OpenAlexW1623796911WikidataQ62042031 ScholiaQ62042031MaRDI QIDQ5136090
Marcos Curty, Charles Ci Wen Lim, Nobuyuki Imoto, Akihiro Mizutani, Kiyoshi Tamaki
Publication date: 25 November 2020
Published in: New Journal of Physics (Search for Journal in Brave)
Full work available at URL: https://arxiv.org/abs/1504.08151
Quantum information, communication, networks (quantum-theoretic aspects) (81P45) Quantum cryptography (quantum-theoretic aspects) (81P94)
Related Items (3)
Finite-key security analysis of the 1-decoy state QKD protocol with a leaky intensity modulator ⋮ Asymmetric twin-field quantum key distribution with both statistical and intensity fluctuations ⋮ Security of BB84 with weak randomness and imperfect qubit encoding
Cites Work
- Unnamed Item
- Unnamed Item
- Weighted sums of certain dependent random variables
- Security analysis of an untrusted source for quantum key distribution: passive approach
- Concise and tight security analysis of the Bennett–Brassard 1984 protocol with finite key lengths
- Practical aspects of measurement-device-independent quantum key distribution
- Security analysis of the decoy method with the Bennett–Brassard 1984 protocol for finite key lengths
- Discrete-phase-randomized coherent state source and its application in quantum key distribution
- Probability Inequalities for Sums of Bounded Random Variables
- Quantum cryptography
- Theory of Cryptography
- A Measure of Asymptotic Efficiency for Tests of a Hypothesis Based on the sum of Observations
This page was built for publication: Finite-key security analysis of quantum key distribution with imperfect light sources