Cargando…
Security of the Decoy-State BB84 Protocol with Imperfect State Preparation
The quantum key distribution (QKD) allows two remote users to share a common information-theoretic secure secret key. In order to guarantee the security of a practical QKD implementation, the physical system has to be fully characterized and all deviations from the ideal protocol due to various impe...
Autores principales: | , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2023
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10670654/ https://www.ncbi.nlm.nih.gov/pubmed/37998248 http://dx.doi.org/10.3390/e25111556 |