Numerical security proof for the decoy-state BB84 protocol and measurement-device-independent quantum key distribution resistant against large basis misalignment
In this work, we incorporate decoy-state analysis into a well-established numerical framework for key rate calculation, and we apply the numerical framework to decoy-state BB84 and measurement-device-independent (MDI) QKD protocols as examples. Additionally, we combine with these decoy-state protoco...
Main Authors: | Wenyuan Wang, Norbert Lütkenhaus |
---|---|
Format: | Article |
Language: | English |
Published: |
American Physical Society
2022-11-01
|
Series: | Physical Review Research |
Online Access: | http://doi.org/10.1103/PhysRevResearch.4.043097 |
Similar Items
-
Security of the Decoy-State BB84 Protocol with Imperfect State Preparation
by: Aleksei Reutov, et al.
Published: (2023-11-01) -
Security proof for variable-length quantum key distribution
by: Devashish Tupkary, et al.
Published: (2024-04-01) -
Semi device independence of the BB84 protocol
by: Erik Woodhead
Published: (2016-01-01) -
Improving key rates of the unbalanced phase-encoded BB84 protocol using the flag-state squashing model
by: Nicky Kai Hong Li, et al.
Published: (2020-11-01) -
Security-proof framework for two-way Gaussian quantum-key-distribution protocols
by: Zhang, Zheshen, et al.
Published: (2018)