You need JavaScript to view this

Security of quantum cryptography with realistic sources

Abstract

The interest in practical implementations of quantum key distribution is steadily growing. However, there is still a need to give a precise security statement which adapts to realistic implementation. In this paper I give the effective key rate we can obtain in a practical setting within scenario of security against individual attacks by an eavesdropper. It illustrates previous results that high losses together with detector dark counts can make secure quantum key distribution impossible. (Author)
Authors:
Lutkenhaus, N [1] 
  1. Helsinki Institute of Physics, P.O. Box 9, 00014 Helsingin yliopisto (Finland)
Publication Date:
Aug 01, 1999
Product Type:
Journal Article
Reference Number:
EDB-01:004534
Resource Relation:
Journal Name: Acta Physica Slovaca; Journal Volume: 49; Journal Issue: 4; Conference: 6. Central-European Workshop on Quantum Optics, Chudobin (Czech Republic), 30 Apr - 3 May 1999; Other Information: 22 refs., 1 fig; PBD: Aug 1999
Subject:
71 CLASSICAL AND QUANTUM MECHANICS, GENERAL PHYSICS; DISTRIBUTION; EIGENSTATES; FOCK REPRESENTATION; MULTI-PHOTON PROCESSES; NONLINEAR OPTICS; PHOTON EMISSION; QUANTUM MECHANICS; SECURITY
OSTI ID:
20122071
Country of Origin:
Slovakia
Language:
English
Other Identifying Numbers:
Journal ID: ISSN 0323-0465; APSVCO; TRN: SK00ST044062243
Submitting Site:
INIS
Size:
page(s) 549-556
Announcement Date:
Jan 15, 2001

Citation Formats

Lutkenhaus, N. Security of quantum cryptography with realistic sources. Slovakia: N. p., 1999. Web.
Lutkenhaus, N. Security of quantum cryptography with realistic sources. Slovakia.
Lutkenhaus, N. 1999. "Security of quantum cryptography with realistic sources." Slovakia.
@misc{etde_20122071,
title = {Security of quantum cryptography with realistic sources}
author = {Lutkenhaus, N}
abstractNote = {The interest in practical implementations of quantum key distribution is steadily growing. However, there is still a need to give a precise security statement which adapts to realistic implementation. In this paper I give the effective key rate we can obtain in a practical setting within scenario of security against individual attacks by an eavesdropper. It illustrates previous results that high losses together with detector dark counts can make secure quantum key distribution impossible. (Author)}
journal = []
issue = {4}
volume = {49}
journal type = {AC}
place = {Slovakia}
year = {1999}
month = {Aug}
}