ar X iv : q ua nt - p h / 04 02 17 0 v 1 2 3 Fe b 20 04 Unconditional Security of Practical Quantum Key Distribution
نویسنده
چکیده
We present an extension of the first proof for the unconditional security of the BB84 quantum key distribution protocol which was given by Mayers. We remove the constraint that a perfect BB84 quantum source is required and the proof given here covers a range of practical quantum sources. Nothing is assumed about the detector except that the efficiency with which signals are detected is basis independent.
منابع مشابه
ar X iv : q ua nt - p h / 04 11 17 2 v 1 2 3 N ov 2 00 4 Information and Entropy in Quantum Theory
متن کامل
ar X iv : q ua nt - p h / 03 05 10 0 v 2 1 0 Fe b 20 04 Polynomial Time Quantum Computation with Advice ∗
Advice is supplementary information that enhances the computational power of an underlying computation. This paper focuses on advice that is given in the form of a pure quantum state and examines the influence of such advice on the behaviors of an underlying polynomial-time quantum computation with bounded-error probability.
متن کاملar X iv : q ua nt - p h / 02 03 04 6 v 1 1 1 M ar 2 00 2 Quantum imaging
We provide a brief overview of the newly born field of quantum imaging, and discuss some concepts that lie at the root of this field.
متن کاملua nt - p h / 04 02 17 8 v 1 2 4 Fe b 20 04 On the structure of optimal sets for tensor product channel
متن کامل
ar X iv : h ep - p h / 04 02 23 9 v 1 2 3 Fe b 20 04 The η → π 0 π 0 γγ decay in Generalized χ PT
Calculations of η → ππγγ decay in Generalized chiral perturbation theory are presented. Tree level and next-to-leading corrections are involved. Sensitivity to violation of the Standard counting is discussed.
متن کامل