Corrigendum: Concise and tight security analysis of the Bennett–Brassard 1984 protocol with finite key lengths (2012 New J. Phys. 14 093014)
The paper (Hayashi M and Tsurumaru T 2012 New J. Phys. https://doi.org/10.1088/1367-2630/14/9/093014 https://doi.org/10.1088/1367-2630/14/9/093014 ) contains an error at the definition of g _t ( x ) in section 5.3 while g _t ( x ) is used for the second order asymptotic expansion for the sacrifice b...
Main Authors: | Masahito Hayashi, Toyohiro Tsurumaru |
---|---|
Format: | Article |
Language: | English |
Published: |
IOP Publishing
2021-01-01
|
Series: | New Journal of Physics |
Subjects: | |
Online Access: | https://doi.org/10.1088/1367-2630/ac3c61 |
Similar Items
-
Concise and tight security analysis of the Bennett–Brassard 1984 protocol with finite key lengths
by: Masahito Hayashi, et al.
Published: (2012-01-01) -
Security analysis of the decoy method with the Bennett–Brassard 1984 protocol for finite key lengths
by: Masahito Hayashi, et al.
Published: (2014-01-01) -
Security of Bennett–Brassard 1984 Quantum-Key Distribution under a Collective-Rotation Noise Channel
by: Mhlambululi Mafu, et al.
Published: (2022-12-01) -
Enhanced winnow key reconciliation for bennett-brassard 84 quantum key distribution protocol /
by: Riaz Ahmad Qamar, 1959- , author, et al.
Published: (2013) -
Enhanced winnow key reconciliation for bennett-brassard 84 quantum key distribution protocol [electronic resource] /
by: Riaz Ahmad Qamar, 1959-
Published: (2013)