2004
DOI: 10.1103/physreva.69.032316
|View full text |Cite
|
Sign up to set email alerts
|

Unconditional security of the Bennett 1992 quantum key-distribution protocol over a lossy and noisy channel

Abstract: We show that the security proof of the Bennett 1992 protocol over loss-free channel given by Tamaki, Koashi, and Imoto [Phys. Rev. Lett. 90, 167904 (2003)] can be adapted to accommodate loss. We assumed that Bob's detectors discriminate between single-photon states on one hand and vacuum state or multiphoton states on the other hand

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

5
56
2

Year Published

2004
2004
2020
2020

Publication Types

Select...
6
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 74 publications
(63 citation statements)
references
References 18 publications
(29 reference statements)
5
56
2
Order By: Relevance
“…Nevertheless, it is possible to achieve unconditional secure key distribution over lossy channels by adapting the overlap of the input signal states. This protocol has been analyzed for lossless channels (Tamaki et al [2003b]) and for lossy channels (Tamaki and Lütkenhaus [2004]). There is no explicit closed formula for the key rate, for a detailed discussion see the original publications.…”
Section: Bennett 92 Protocol With Single Photonsmentioning
confidence: 99%
“…Nevertheless, it is possible to achieve unconditional secure key distribution over lossy channels by adapting the overlap of the input signal states. This protocol has been analyzed for lossless channels (Tamaki et al [2003b]) and for lossy channels (Tamaki and Lütkenhaus [2004]). There is no explicit closed formula for the key rate, for a detailed discussion see the original publications.…”
Section: Bennett 92 Protocol With Single Photonsmentioning
confidence: 99%
“…As long as the law of quantum mechanics is valid, an eavesdropper, Eve, cannot force Alice and Bob to accept a key on which she has a nonnegligible amount of information. A proof of such unconditional security was first provided by Mayers [1] for the BB84 protocol [2], followed by other proofs [3,4,5,6,7,8]. While a perfect single-photon source is assumed in the earlier proofs, recent proofs [5,6] cover the use of a weak laser pulse in a coherent state as a substitute for a single photon.…”
mentioning
confidence: 99%
“…With the above decomposition of Bob's measurement, we can prove the unconditional security by a method similar to the cases of qubit-based B92 protocols [7,8]. We introduce a protocol based on entanglement distillation [12], which is later shown to be equivalent to the real protocol.…”
mentioning
confidence: 99%
“…More recently, unconditional security proofs based on the Shor-Preskill idea have been put forward for other protocols, e.g the six-state protocol [35], the Bennett two-state protocol in a qubit channel without [56] and with loss [58], the Bennett two-state protocol in the strong-phase reference version [33,59], and a recent protocol with spherical codes [9].…”
Section: Security Proofs and Their Application To Current Experimentsmentioning
confidence: 99%