We examine security of a protocol on cryptographic key distribution viaclassical noise proposed by Yuen and Kim (Phys. Lett. A 241 135 (1998)).Theoretical and experimental analysis in terms of the secure key distributionrate shows that secure key distribution is possible even if the eavesdroppercould receive more photons than the legitimate receiver, as long as thesignal-to-noise-ratio (SNR) of the receiver is better than -9dB of theeavesdropper's SNR. Secure key distribution was demonstrated at the maximumrate of 0.04 bit per sender's bit and transmission rate of 2 Mb/s in theexperiment employing conventional fiber optics. The present protocol hasadvantages of the efficient key distribution and the simple implementation overother quantum k...
Basic techniques to prove the unconditional security of quantum cryptography are described. They are...
We present a complete protocol for BB84 quantum key distribution for a realistic setting (noise, los...
We prove the unconditional security of the original Bennett 1992 protocol with strong reference puls...
We apply the techniques introduced in [Kraus et. al., Phys. Rev. Lett. 95, 080501, 2005] to prove se...
Quantum key distribution is the most well-known application of quantum cryptography. Previous propos...
In this article I present a protocol for quantum cryptography which is secure against individual att...
We apply the techniques introduced by Kraus et al. [Phys. Rev. Lett. 95, 080501 (2005)] to prove sec...
We consider the security of a system of quantum key distribution (QKD) using only practical devices....
The theoretical existence of photon-number-splitting attacks creates a security loophole for most qu...
We provide a complete proof of the security of quantum cryptography against any eavesdropping attack...
Cryptography - the art of secure communications, has been developed at leastover 2500 years. Still a...
We prove the security of the Bennett-Brassard (BB84) quantum key distribution protocol in the case w...
A new class of quantum cryptography (QC) protocols that are robust against the most general photon n...
This paper considers the distribution of a secret key over an optical (bosonic) channel in the regim...
Quantum cryptograph exploits the fundamental laws of quantum mechanics to provide a secure way to ex...
Basic techniques to prove the unconditional security of quantum cryptography are described. They are...
We present a complete protocol for BB84 quantum key distribution for a realistic setting (noise, los...
We prove the unconditional security of the original Bennett 1992 protocol with strong reference puls...
We apply the techniques introduced in [Kraus et. al., Phys. Rev. Lett. 95, 080501, 2005] to prove se...
Quantum key distribution is the most well-known application of quantum cryptography. Previous propos...
In this article I present a protocol for quantum cryptography which is secure against individual att...
We apply the techniques introduced by Kraus et al. [Phys. Rev. Lett. 95, 080501 (2005)] to prove sec...
We consider the security of a system of quantum key distribution (QKD) using only practical devices....
The theoretical existence of photon-number-splitting attacks creates a security loophole for most qu...
We provide a complete proof of the security of quantum cryptography against any eavesdropping attack...
Cryptography - the art of secure communications, has been developed at leastover 2500 years. Still a...
We prove the security of the Bennett-Brassard (BB84) quantum key distribution protocol in the case w...
A new class of quantum cryptography (QC) protocols that are robust against the most general photon n...
This paper considers the distribution of a secret key over an optical (bosonic) channel in the regim...
Quantum cryptograph exploits the fundamental laws of quantum mechanics to provide a secure way to ex...
Basic techniques to prove the unconditional security of quantum cryptography are described. They are...
We present a complete protocol for BB84 quantum key distribution for a realistic setting (noise, los...
We prove the unconditional security of the original Bennett 1992 protocol with strong reference puls...