We prove the unconditional security of the original Bennett 1992 protocol with strong reference pulse. We qualitatively show the dependency of the intensities of the reference pulse on the security and find that the key generation rate is proportional to the channel transmission rate for proper choice of parameters
We apply the techniques introduced by Kraus et al. [Phys. Rev. Lett. 95, 080501 (2005)] to prove sec...
We show that the security proof of the Bennett 1992 protocol over loss-free channel in (K. Tamaki, M...
This note presents a method of public key distribution using quantum communication of n photons that...
We apply the techniques introduced in [Kraus et. al., Phys. Rev. Lett. 95, 080501, 2005] to prove se...
We prove the security of the Bennett-Brassard (BB84) quantum key distribution protocol in the case w...
Quantum key distribution is the most well-known application of quantum cryptography. Previous propos...
We report here a complete experimental realization of one-way decoy-pulse quantum key distribution, ...
Basic techniques to prove the unconditional security of quantum cryptography are described. They are...
We prove the security of the Bennett-Brassard (BB84) quantum key distribution protocol for an arbitr...
In this article I present a protocol for quantum cryptography which is secure against individual att...
We consider the security of a system of quantum key distribution (QKD) using only practical devices....
A new class of quantum cryptography (QC) protocols that are robust against the most general photon n...
We examine security of a protocol on cryptographic key distribution viaclassical noise proposed by Y...
We show the unconditional security of decoy-state method with whatever intensity error pattern if th...
We propose a quantum key distribution scheme by using screening angles and analyzing detectors which...
We apply the techniques introduced by Kraus et al. [Phys. Rev. Lett. 95, 080501 (2005)] to prove sec...
We show that the security proof of the Bennett 1992 protocol over loss-free channel in (K. Tamaki, M...
This note presents a method of public key distribution using quantum communication of n photons that...
We apply the techniques introduced in [Kraus et. al., Phys. Rev. Lett. 95, 080501, 2005] to prove se...
We prove the security of the Bennett-Brassard (BB84) quantum key distribution protocol in the case w...
Quantum key distribution is the most well-known application of quantum cryptography. Previous propos...
We report here a complete experimental realization of one-way decoy-pulse quantum key distribution, ...
Basic techniques to prove the unconditional security of quantum cryptography are described. They are...
We prove the security of the Bennett-Brassard (BB84) quantum key distribution protocol for an arbitr...
In this article I present a protocol for quantum cryptography which is secure against individual att...
We consider the security of a system of quantum key distribution (QKD) using only practical devices....
A new class of quantum cryptography (QC) protocols that are robust against the most general photon n...
We examine security of a protocol on cryptographic key distribution viaclassical noise proposed by Y...
We show the unconditional security of decoy-state method with whatever intensity error pattern if th...
We propose a quantum key distribution scheme by using screening angles and analyzing detectors which...
We apply the techniques introduced by Kraus et al. [Phys. Rev. Lett. 95, 080501 (2005)] to prove sec...
We show that the security proof of the Bennett 1992 protocol over loss-free channel in (K. Tamaki, M...
This note presents a method of public key distribution using quantum communication of n photons that...