In this article we deal with the security of the BB84 quantum cryptography protocol over noisy channels using generalized privacy amplification. For this we estimate the fraction of bits needed to be discarded during the privacy amplification step. This estimate is given for two scenarios, both of which assume the eavesdropper to access each of the signals independently and take error correction into account. One scenario does not allow a delay of the eavesdropper's measurement of a measurement probe until he receives additional classical information. In this scenario we achieve a sharp bound. The other scenario allows a measurement delay, so that the general attack of an eavesdropper on individual signals is covered. This bound is not shar...
In this article we present the BB84 quantum key distribution scheme from two perspectives. First, we...
When the 4-state or the 6-state protocol of quantum cryptography is carried out on a noisy (i.e. rea...
Existing quantum cryptographic schemes are not, as they stand, operable in the presence of noise on ...
A sharp estimate is given for the amount of Shannon information and expected collision probability. ...
In this article I present a protocol for quantum cryptography which is secure against individual att...
We provide a complete proof of the security of quantum cryptography against any eavesdropping attack...
Existing quantum cryptographic schemes are not, as they stand, operable in the presence of noise on ...
We present new physical bounds on quantum information, and use them to prove the security of quantum...
In 1984, C.H. Bennet and G. Brassard proposed a new protocol aimed to solve the problem of symmetric...
By sending systems in specially prepared quantum states, two parties can communicate without an eave...
The peculiar properties of quantum mechanics enable possibilities not allowed by classical physics. ...
We present a complete protocol for BB84 quantum key distribution for a realistic setting (noise, los...
Basic techniques to prove the unconditional security of quantum cryptography are described. They are...
The recent application of the principles of quantum mechanics to cryptography has led to a remarkabl...
The quantum key distribution protocol BB84, published by C. H. Bennett and G. Brassard in 1984, desc...
In this article we present the BB84 quantum key distribution scheme from two perspectives. First, we...
When the 4-state or the 6-state protocol of quantum cryptography is carried out on a noisy (i.e. rea...
Existing quantum cryptographic schemes are not, as they stand, operable in the presence of noise on ...
A sharp estimate is given for the amount of Shannon information and expected collision probability. ...
In this article I present a protocol for quantum cryptography which is secure against individual att...
We provide a complete proof of the security of quantum cryptography against any eavesdropping attack...
Existing quantum cryptographic schemes are not, as they stand, operable in the presence of noise on ...
We present new physical bounds on quantum information, and use them to prove the security of quantum...
In 1984, C.H. Bennet and G. Brassard proposed a new protocol aimed to solve the problem of symmetric...
By sending systems in specially prepared quantum states, two parties can communicate without an eave...
The peculiar properties of quantum mechanics enable possibilities not allowed by classical physics. ...
We present a complete protocol for BB84 quantum key distribution for a realistic setting (noise, los...
Basic techniques to prove the unconditional security of quantum cryptography are described. They are...
The recent application of the principles of quantum mechanics to cryptography has led to a remarkabl...
The quantum key distribution protocol BB84, published by C. H. Bennett and G. Brassard in 1984, desc...
In this article we present the BB84 quantum key distribution scheme from two perspectives. First, we...
When the 4-state or the 6-state protocol of quantum cryptography is carried out on a noisy (i.e. rea...
Existing quantum cryptographic schemes are not, as they stand, operable in the presence of noise on ...