Improving key rates of the unbalanced phase-encoded BB84 protocol using the flag-state squashing model
All phase-encoded BB84 implementations have signal states with unbalanced amplitudes in practice. Thus the original security analyses a priori do not apply to them. Previous security proofs use signal tagging of multiphoton pulses to recover the behavior of regular BB84. This is overly conservative...
Main Authors: | Nicky Kai Hong Li, Norbert Lütkenhaus |
---|---|
Format: | Article |
Language: | English |
Published: |
American Physical Society
2020-11-01
|
Series: | Physical Review Research |
Online Access: | http://doi.org/10.1103/PhysRevResearch.2.043172 |
Similar Items
-
Numerical security proof for the decoy-state BB84 protocol and measurement-device-independent quantum key distribution resistant against large basis misalignment
by: Wenyuan Wang, et al.
Published: (2022-11-01) -
Implemetation of BB84 quantum key distribution protocol’s with attacks.
by: Muhammad, Nur Atiqah, et al.
Published: (2009) -
Modified BB84 quantum key distribution protocol robust to source imperfections
by: Margarida Pereira, et al.
Published: (2023-04-01) -
Semi device independence of the BB84 protocol
by: Erik Woodhead
Published: (2016-01-01) -
Numerical calculations of the finite key rate for general quantum key distribution protocols
by: Ian George, et al.
Published: (2021-03-01)