Please use this identifier to cite or link to this item: https://doi.org/10.1007/978-3-540-89304-2-8
DC FieldValue
dc.titleSecurity bounds for quantum cryptography with finite resources
dc.contributor.authorScarani, V.
dc.contributor.authorRenner, R.
dc.date.accessioned2014-10-16T09:52:26Z
dc.date.available2014-10-16T09:52:26Z
dc.date.issued2008
dc.identifier.citationScarani, V.,Renner, R. (2008). Security bounds for quantum cryptography with finite resources. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 5106 LNCS : 83-95. ScholarBank@NUS Repository. <a href="https://doi.org/10.1007/978-3-540-89304-2-8" target="_blank">https://doi.org/10.1007/978-3-540-89304-2-8</a>
dc.identifier.isbn3540893032
dc.identifier.issn03029743
dc.identifier.urihttp://scholarbank.nus.edu.sg/handle/10635/98870
dc.description.abstractA practical quantum key distribution (QKD) protocol necessarily runs in finite time and, hence, only a finite amount of communication is exchanged. This is in contrast to most of the standard results on the security of QKD, which only hold in the limit where the number of transmitted signals approaches infinity. Here, we analyze the security of QKD under the realistic assumption that the amount of communication is finite. At the level of the general formalism, we present new results that help simplifying the actual implementation of QKD protocols: in particular, we show that symmetrization steps, which are required by certain security proofs (e.g., proofs based on de Finetti's representation theorem), can be omitted in practical implementations. Also, we demonstrate how two-way reconciliation protocols can be taken into account in the security analysis. At the level of numerical estimates, we present the bounds with finite resources for "device-independent security" against collective attacks. © 2008 Springer Berlin Heidelberg.
dc.description.urihttp://libproxy1.nus.edu.sg/login?url=http://dx.doi.org/10.1007/978-3-540-89304-2-8
dc.sourceScopus
dc.typeConference Paper
dc.contributor.departmentPHYSICS
dc.description.doi10.1007/978-3-540-89304-2-8
dc.description.sourcetitleLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
dc.description.volume5106 LNCS
dc.description.page83-95
dc.identifier.isiutNOT_IN_WOS
Appears in Collections:Staff Publications

Show simple item record
Files in This Item:
There are no files associated with this item.

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.