作者: H. Inamori , N. Lütkenhaus , D. Mayers
DOI: 10.1140/EPJD/E2007-00010-4
关键词: BB84 、 Key (cryptography) 、 Computer engineering 、 Quantum key distribution 、 Decoy state 、 Quantum cryptography 、 Protocol (object-oriented programming) 、 Composability 、 Quantum mechanics 、 Quantum information science 、 Computer science
摘要: We present a complete protocol for BB84 quantum key distribution realistic setting (noise, loss, multi-photon signals of the source) that covers many todays experimental implementations. The security this is shown against an eavesdropper having unrestricted power to manipulate coherently on their path from sender receiver. and proof take into account effects concerning finite size generated key. This paper identical preprint arXiv:quant-ph/0107017, which was finalized in 2001. Therefore, some more recent developments, including question composability, are not addressed.