ﻻ يوجد ملخص باللغة العربية
Coherent-one-way quantum key distribution (COW-QKD), possessing the simple experimental setup and the ability against the photon-number-splitting attack, has been implemented in various experiments and commercial applications. However, recent works have proved that current COW-QKD with key rate scaling linearly with transmittance is totally insecure under the zero-error attack. This conclusion leads to a crucial consequence that all the current attempts for practicalization are in vain. To solve this pending issue, here we conduct a minor revision on original COW-QKD while maintaining the original experimental setup as well as the simplicity of implementation. By more precisely estimating the amount of leaked information, we provide an explicit unconditional secure key rate which scales with $0.7%$ of the bound that quadratically scales with transmittance. Our work provides a revised COW-QKD which guarantees the availability of the current implementations of COW-QKD within 100 km and establishes the theoretical foundations for further application.
We prove the security of the 1984 protocol of Bennett and Brassard (BB84) for quantum key distribution. We first give a key distribution protocol based on entanglement purification, which can be proven secure using methods from Lo and Chaus proof of
High-dimensional quantum key distribution (QKD) provides ultimate secure communication with secure key rates that cannot be obtained by QKD protocols with binary encoding. However, so far the proposed protocols required additional experimental resour
We prove the security of theoretical quantum key distribution against the most general attacks which can be performed on the channel, by an eavesdropper who has unlimited computation abilities, and the full power allowed by the rules of classical and
The work by Christandl, Konig and Renner [Phys. Rev. Lett. 102, 020504 (2009)] provides in particular the possibility of studying unconditional security in the finite-key regime for all discrete-variable protocols. We spell out this bound from their
In this paper we present finite-key security analysis for quantum key distribution protocol based on weak coherent (in particular phase-coded) states using a fully quantum asymptotic equipartition property technique. This work is the extension of the