Upper bounds of eavesdropper’s performances in finite-length code with the decoy method
- 26 July 2007
- journal article
- research article
- Published by American Physical Society (APS) in Physical Review A
- Vol. 76 (1), 012329
- https://doi.org/10.1103/physreva.76.012329
Abstract
Security formulas of quantum key distribution (QKD) with imperfect resources are obtained for finite-length code when the decoy method is applied. This analysis is useful for guaranteeing the security of implemented QKD systems. Our formulas take into account the effect of the vacuum state and dark counts in the detector. We compare the asymptotic key generation rate in the presence of dark counts to that without the presence of dark counts.Keywords
Other Versions
This publication has 15 references indexed in Scilit:
- NOISE TOLERANCE OF THE BB84 PROTOCOL WITH RANDOM PRIVACY AMPLIFICATIONInternational Journal of Quantum Information, 2006
- Practical evaluation of security for quantum key distributionPhysical Review A, 2006
- Information-theoretic security proof for quantum-key-distribution protocolsPhysical Review A, 2005
- Practical decoy state for quantum key distributionPhysical Review A, 2005
- Decoy-state protocol for quantum cryptography with four different intensities of coherent lightPhysical Review A, 2005
- Decoy State Quantum Key DistributionPhysical Review Letters, 2005
- Beating the Photon-Number-Splitting Attack in Practical Quantum CryptographyPhysical Review Letters, 2005
- Quantum Key Distribution with High Loss: Toward Global Secure CommunicationPhysical Review Letters, 2003
- Unconditional security in quantum cryptographyJournal of the ACM, 2001
- Simple Proof of Security of the BB84 Quantum Key Distribution ProtocolPhysical Review Letters, 2000