Abstract
The interest in practical implementations of quantum key distribution is steadily growing. However, there is still a need to give a precise security statement which adapts to realistic implementation. In this paper I give the effective key rate we can obtain in a practical setting within scenario of security against individual attacks by an eavesdropper. It illustrates previous results that high losses together with detector dark counts can make secure quantum key distribution impossible. (Author)
Lutkenhaus, N
[1]
- Helsinki Institute of Physics, P.O. Box 9, 00014 Helsingin yliopisto (Finland)
Citation Formats
Lutkenhaus, N.
Security of quantum cryptography with realistic sources.
Slovakia: N. p.,
1999.
Web.
Lutkenhaus, N.
Security of quantum cryptography with realistic sources.
Slovakia.
Lutkenhaus, N.
1999.
"Security of quantum cryptography with realistic sources."
Slovakia.
@misc{etde_20122071,
title = {Security of quantum cryptography with realistic sources}
author = {Lutkenhaus, N}
abstractNote = {The interest in practical implementations of quantum key distribution is steadily growing. However, there is still a need to give a precise security statement which adapts to realistic implementation. In this paper I give the effective key rate we can obtain in a practical setting within scenario of security against individual attacks by an eavesdropper. It illustrates previous results that high losses together with detector dark counts can make secure quantum key distribution impossible. (Author)}
journal = []
issue = {4}
volume = {49}
journal type = {AC}
place = {Slovakia}
year = {1999}
month = {Aug}
}
title = {Security of quantum cryptography with realistic sources}
author = {Lutkenhaus, N}
abstractNote = {The interest in practical implementations of quantum key distribution is steadily growing. However, there is still a need to give a precise security statement which adapts to realistic implementation. In this paper I give the effective key rate we can obtain in a practical setting within scenario of security against individual attacks by an eavesdropper. It illustrates previous results that high losses together with detector dark counts can make secure quantum key distribution impossible. (Author)}
journal = []
issue = {4}
volume = {49}
journal type = {AC}
place = {Slovakia}
year = {1999}
month = {Aug}
}