We prove the security of the Bennett-Brassard (BB84) quantum key distribution protocol for an arbitrary source whose averaged states are basis independent, a condition that is automatically satisfied if the source is suitably designed. The proof is based on the observation that, to an adversary, the key extraction process is equivalent to a measurement in the sigma-hatx basis performed on a pure sigma-hatz-basis eigenstate. The dependence of the achievable key length on the bit error rate is the same as that established by Shor and Preskill [Phys. Rev. Lett. 85, 441 (2000)] for a perfect source, indicating that the defects in the source are efficiently detected by the protocol
We consider the security of the Bennett-Brassard 1984 (BB84) protocol for Quantum Key Distribution (...
We prove the security of a quantum key distribution scheme based on transmission of squeezed quantum...
We study achievable secret key rates for the Bennett-Brassard-84 (BB84) quantum key distribution pro...
We devise a simple modification that essentially doubles the efficiency of the BB84 quantum key dist...
Quantum key distribution is the most well-known application of quantum cryptography. Previous propos...
States with private correlations but little or no distillable entanglement were recently reported. H...
In this article I present a protocol for quantum cryptography which is secure against individual att...
Basic techniques to prove the unconditional security of quantum cryptography are described. They are...
We prove the security of the Bennett-Brassard (BB84) quantum key distribution protocol in the case w...
We prove the security of the Bennett-Brassard (BB84) quantum key distribution protocol in the case w...
We prove the unconditional security of the original Bennett 1992 protocol with strong reference puls...
We prove that the 1984 protocol of Bennett and Brassard (BB84) for quantum key distribution is secur...
We prove unconditional security for a quantum key distribution (QKD) protocol based on distilling pb...
We present security proofs for a protocol for Quantum Key Distribution (QKD) based on encoding in fi...
We prove the security of the Bennett-Brassard (BB84) quantum key distribution protocol in the case w...
We consider the security of the Bennett-Brassard 1984 (BB84) protocol for Quantum Key Distribution (...
We prove the security of a quantum key distribution scheme based on transmission of squeezed quantum...
We study achievable secret key rates for the Bennett-Brassard-84 (BB84) quantum key distribution pro...
We devise a simple modification that essentially doubles the efficiency of the BB84 quantum key dist...
Quantum key distribution is the most well-known application of quantum cryptography. Previous propos...
States with private correlations but little or no distillable entanglement were recently reported. H...
In this article I present a protocol for quantum cryptography which is secure against individual att...
Basic techniques to prove the unconditional security of quantum cryptography are described. They are...
We prove the security of the Bennett-Brassard (BB84) quantum key distribution protocol in the case w...
We prove the security of the Bennett-Brassard (BB84) quantum key distribution protocol in the case w...
We prove the unconditional security of the original Bennett 1992 protocol with strong reference puls...
We prove that the 1984 protocol of Bennett and Brassard (BB84) for quantum key distribution is secur...
We prove unconditional security for a quantum key distribution (QKD) protocol based on distilling pb...
We present security proofs for a protocol for Quantum Key Distribution (QKD) based on encoding in fi...
We prove the security of the Bennett-Brassard (BB84) quantum key distribution protocol in the case w...
We consider the security of the Bennett-Brassard 1984 (BB84) protocol for Quantum Key Distribution (...
We prove the security of a quantum key distribution scheme based on transmission of squeezed quantum...
We study achievable secret key rates for the Bennett-Brassard-84 (BB84) quantum key distribution pro...