Security of quantum key distribution with imperfect devices

D Gottesman, HK Lo, N Lutkenhaus… - … Theory, 2004. ISIT …, 2004 - ieeexplore.ieee.org
International Symposium onInformation Theory, 2004. ISIT 2004 …, 2004ieeexplore.ieee.org
This paper prove the security of the Bennett-Brassard (BB84) quantum key distribution
protocol in the case where the source and detector are under the limited control of an
adversary. This proof applies when both the source and the detector have small basis-
dependent flaws, as is typical in practical implementations of the protocol. The estimation of
the key generation rate in some special cases: sources that emit weak coherent states,
detectors with basis-dependent efficiency, and misaligned sources and detectors.
This paper prove the security of the Bennett-Brassard (BB84) quantum key distribution protocol in the case where the source and detector are under the limited control of an adversary. This proof applies when both the source and the detector have small basis-dependent flaws, as is typical in practical implementations of the protocol. The estimation of the key generation rate in some special cases: sources that emit weak coherent states, detectors with basis-dependent efficiency, and misaligned sources and detectors.
ieeexplore.ieee.org