Decoy-state quantum key distribution with a leaky source
DOI10.1088/1367-2630/18/6/065008zbMATH Open1456.81161arXiv1803.06045OpenAlexW3099750387WikidataQ62592114 ScholiaQ62592114MaRDI QIDQ5855055FDOQ5855055
Authors: Kiyoshi Tamaki, Marcos Curty, Marco Lucamarini
Publication date: 12 March 2021
Published in: New Journal of Physics (Search for Journal in Brave)
Full work available at URL: https://arxiv.org/abs/1803.06045
Recommendations
- Finite-key security analysis of the 1-decoy state QKD protocol with a leaky intensity modulator
- Security of quantum key distribution with imperfect devices
- Finite-key security analysis of quantum key distribution with imperfect light sources
- scientific article; zbMATH DE number 5989869
- Security of practical BB84 quantum key distribution
Quantum cryptography (quantum-theoretic aspects) (81P94) Computational stability and error-correcting codes for quantum computation and communication processing (81P73)
Cites Work
- Title not available (Why is that?)
- Security of quantum key distribution with imperfect devices
- Communication Theory of Secrecy Systems*
- Quantum cryptography
- Weighted sums of certain dependent random variables
- Time-shift attack in practical quantum cryptosystems
- Title not available (Why is that?)
- Linear programming. Foundations and extensions.
- Title not available (Why is that?)
- Security analysis of an untrusted source for quantum key distribution: passive approach
- Title not available (Why is that?)
- Title not available (Why is that?)
Cited In (9)
- Practical decoy-state quantum private queries against joint-measurement attack under weak coherent pulse sources
- Securing QKD links in the full Hilbert space
- Security of quantum key distribution with state-dependent imperfections
- Passive Decoy State Quantum Key Distribution
- An enhanced proposal on decoy-state measurement device-independent quantum key distribution
- Finite-key security analysis of the 1-decoy state QKD protocol with a leaky intensity modulator
- Title not available (Why is that?)
- Finite-key security analysis of quantum key distribution with imperfect light sources
- Optimizing of decoy state quantum key distribution system based on phase coding
This page was built for publication: Decoy-state quantum key distribution with a leaky source
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5855055)