2009
DOI: 10.1088/1367-2630/11/4/045018
|View full text |Cite
|
Sign up to set email alerts
|

Simple security proof of quantum key distribution based on complementarity

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

2
347
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 258 publications
(349 citation statements)
references
References 21 publications
2
347
0
Order By: Relevance
“…(9). The security argument behind it is that when Alice sends out vacuum states, Eve gains nothing about Alice's qubits by measuring the state in the channel [60,62].…”
Section: A Key Ratementioning
confidence: 99%
“…(9). The security argument behind it is that when Alice sends out vacuum states, Eve gains nothing about Alice's qubits by measuring the state in the channel [60,62].…”
Section: A Key Ratementioning
confidence: 99%
“…Fortunately, security proof of standard BB84 with basis-dependent flaw has already been shown to be secure [12][13][14], and we generalize this idea to our case where we have basis-dependent flaw from both of Alice and Bob. In order to do so, we consider a virtual protocol [12][13][14]22] that Alice and Bob get together and the basis choices by Alice and Bob are made via measurement processes on the so-called quantum coin. In this virtual protocol of the phase encoding scheme I, Alice and Bob prepare joint systems in the state [23]…”
Section: Security Proofmentioning
confidence: 99%
“…To make this intuition rigorous, we briefly review the idea by [13,14] which applies Bloch sphere bound [27] to the quantum coin. Suppose that we randomly choose Z-basis or X-basis as the measurement basis for each quantum coin.…”
Section: Security Proofmentioning
confidence: 99%
See 2 more Smart Citations