Please use this identifier to cite or link to this item: https://doi.org/10.1088/1367-2630/16/6/063009
DC FieldValue
dc.titleSecurity analysis of the decoy method with the Bennett-Brassard 1984 protocol for finite key lengths
dc.contributor.authorHayashi, M
dc.contributor.authorNakayama, R
dc.date.accessioned2020-10-26T07:23:27Z
dc.date.available2020-10-26T07:23:27Z
dc.date.issued2014
dc.identifier.citationHayashi, M, Nakayama, R (2014). Security analysis of the decoy method with the Bennett-Brassard 1984 protocol for finite key lengths. New Journal of Physics 16 : 63009. ScholarBank@NUS Repository. https://doi.org/10.1088/1367-2630/16/6/063009
dc.identifier.issn1367-2630
dc.identifier.urihttps://scholarbank.nus.edu.sg/handle/10635/180180
dc.description.abstractThis paper provides a formula for the sacrifice bit-length for privacy amplification with the Bennett-Brassard 1984 protocol for finite key lengths, when we employ the decoy method. Using the formula, we can guarantee the security parameter for a realizable quantum key distribution system. The key generation rates with finite key lengths are numerically evaluated. The proposed method improves the existing key generation rate even in the asymptotic setting. © 2014 IOP Publishing Ltd and Deutsche Physikalische Gesellschaft.
dc.publisherInstitute of Physics Publishing
dc.rightsAttribution 4.0 International
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/
dc.sourceUnpaywall 20201031
dc.subjectError correction
dc.subjectBB84 protocol
dc.subjectdecoy method
dc.subjectfinite-key length
dc.subjectInterval estimation
dc.subjectper cent point
dc.subjectPhase error correction
dc.subjectQuantum cryptography
dc.typeArticle
dc.contributor.departmentCENTRE FOR QUANTUM TECHNOLOGIES
dc.description.doi10.1088/1367-2630/16/6/063009
dc.description.sourcetitleNew Journal of Physics
dc.description.volume16
dc.description.page63009
dc.published.statePublished
Appears in Collections:Staff Publications
Elements

Show simple item record
Files in This Item:
File Description SizeFormatAccess SettingsVersion 
10_1088_1367-2630_16_6_063009.pdf3.12 kBAdobe PDF

OPEN

NoneView/Download

Google ScholarTM

Check

Altmetric


This item is licensed under a Creative Commons License Creative Commons