Cargando…
Tight security bounds for decoy-state quantum key distribution
The BB84 quantum key distribution (QKD) combined with decoy-state method is currently the most practical protocol, which has been proved secure against general attacks in the finite-key regime. Thereinto, statistical fluctuation analysis methods are very important in dealing with finite-key effects,...
Autores principales: | Yin, Hua-Lei, Zhou, Min-Gang, Gu, Jie, Xie, Yuan-Mei, Lu, Yu-Shuo, Chen, Zeng-Bing |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Nature Publishing Group UK
2020
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7458928/ https://www.ncbi.nlm.nih.gov/pubmed/32868774 http://dx.doi.org/10.1038/s41598-020-71107-6 |
Ejemplares similares
-
Decoy-state quantum key distribution with biased basis choice
por: Wei, Zhengchao, et al.
Publicado: (2013) -
Security of quantum key distribution with multiphoton components
por: Yin, Hua-Lei, et al.
Publicado: (2016) -
Hacking on decoy-state quantum key distribution system with partial phase randomization
por: Sun, Shi-Hai, et al.
Publicado: (2014) -
Finite-key analysis for twin-field quantum key distribution with composable security
por: Yin, Hua-Lei, et al.
Publicado: (2019) -
Retraction: Hacking on decoy-state quantum key distribution system with partial phase randomization
por: Sun, Shi-Hai, et al.
Publicado: (2018)