Please use this identifier to cite or link to this item:
https://doi.org/10.1088/1367-2630/16/6/063009
Title: | Security analysis of the decoy method with the Bennett-Brassard 1984 protocol for finite key lengths | Authors: | Hayashi, M Nakayama, R |
Keywords: | Error correction BB84 protocol decoy method finite-key length Interval estimation per cent point Phase error correction Quantum cryptography |
Issue Date: | 2014 | Publisher: | Institute of Physics Publishing | Citation: | Hayashi, M, Nakayama, R (2014). Security analysis of the decoy method with the Bennett-Brassard 1984 protocol for finite key lengths. New Journal of Physics 16 : 63009. ScholarBank@NUS Repository. https://doi.org/10.1088/1367-2630/16/6/063009 | Rights: | Attribution 4.0 International | Abstract: | This paper provides a formula for the sacrifice bit-length for privacy amplification with the Bennett-Brassard 1984 protocol for finite key lengths, when we employ the decoy method. Using the formula, we can guarantee the security parameter for a realizable quantum key distribution system. The key generation rates with finite key lengths are numerically evaluated. The proposed method improves the existing key generation rate even in the asymptotic setting. © 2014 IOP Publishing Ltd and Deutsche Physikalische Gesellschaft. | Source Title: | New Journal of Physics | URI: | https://scholarbank.nus.edu.sg/handle/10635/180180 | ISSN: | 1367-2630 | DOI: | 10.1088/1367-2630/16/6/063009 | Rights: | Attribution 4.0 International |
Appears in Collections: | Staff Publications Elements |
Show full item record
Files in This Item:
File | Description | Size | Format | Access Settings | Version | |
---|---|---|---|---|---|---|
10_1088_1367-2630_16_6_063009.pdf | 3.12 kB | Adobe PDF | OPEN | None | View/Download |
This item is licensed under a Creative Commons License