Please use this identifier to cite or link to this item: https://doi.org/10.1088/1367-2630/16/6/063009
Title: Security analysis of the decoy method with the Bennett-Brassard 1984 protocol for finite key lengths
Authors: Hayashi, M 
Nakayama, R
Keywords: Error correction
BB84 protocol
decoy method
finite-key length
Interval estimation
per cent point
Phase error correction
Quantum cryptography
Issue Date: 2014
Publisher: Institute of Physics Publishing
Citation: Hayashi, M, Nakayama, R (2014). Security analysis of the decoy method with the Bennett-Brassard 1984 protocol for finite key lengths. New Journal of Physics 16 : 63009. ScholarBank@NUS Repository. https://doi.org/10.1088/1367-2630/16/6/063009
Rights: Attribution 4.0 International
Abstract: This paper provides a formula for the sacrifice bit-length for privacy amplification with the Bennett-Brassard 1984 protocol for finite key lengths, when we employ the decoy method. Using the formula, we can guarantee the security parameter for a realizable quantum key distribution system. The key generation rates with finite key lengths are numerically evaluated. The proposed method improves the existing key generation rate even in the asymptotic setting. © 2014 IOP Publishing Ltd and Deutsche Physikalische Gesellschaft.
Source Title: New Journal of Physics
URI: https://scholarbank.nus.edu.sg/handle/10635/180180
ISSN: 1367-2630
DOI: 10.1088/1367-2630/16/6/063009
Rights: Attribution 4.0 International
Appears in Collections:Staff Publications
Elements

Show full item record
Files in This Item:
File Description SizeFormatAccess SettingsVersion 
10_1088_1367-2630_16_6_063009.pdf3.12 kBAdobe PDF

OPEN

NoneView/Download

Google ScholarTM

Check

Altmetric


This item is licensed under a Creative Commons License Creative Commons