Finite-key security analysis of the 1-decoy state QKD protocol with a leaky intensity modulator
From MaRDI portal
Publication:2681528
DOI10.1007/s11128-020-02694-6OpenAlexW3032192123MaRDI QIDQ2681528
Zhi Ma, Xiangdong Meng, Yangyang Fei, Weilong Wang
Publication date: 3 February 2023
Published in: Quantum Information Processing (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s11128-020-02694-6
information leakagequantum key distributionfinite-key security analysisintensity modulatorone-decoy protocol
Authentication, digital signatures and secret sharing (94A62) Quantum cryptography (quantum-theoretic aspects) (81P94)
Cites Work
- Unnamed Item
- Quantum cryptography: public key distribution and coin tossing
- Probability inequalities for the sum in sampling without replacement
- Weighted sums of certain dependent random variables
- Finite-key security analysis of quantum key distribution with imperfect light sources
- Decoy-state quantum key distribution with a leaky source