Security analysis of the decoy method with the Bennett–Brassard 1984 protocol for finite key lengths

This paper provides a formula for the sacrifice bit-length for privacy amplification with the Bennett–Brassard 1984 protocol for finite key lengths, when we employ the decoy method. Using the formula, we can guarantee the security parameter for a realizable quantum key distribution system. The key g...

Full description

Bibliographic Details
Main Authors: Masahito Hayashi, Ryota Nakayama
Format: Article
Language:English
Published: IOP Publishing 2014-01-01
Series:New Journal of Physics
Subjects:
Online Access:https://doi.org/10.1088/1367-2630/16/6/063009