Full text
![]() Preview |
PDF
- Requires a PDF viewer, such as GSview, Xpdf or Adobe Acrobat Reader
Download (540kB) |
Salas Peralta, Pedro Jesús (2013). Security of plug-and-play QKD arrangements with finite resources. "Quantum Information & Computation", v. 13 (n. 9-10); pp. 861-879. ISSN 1533-7146.
Title: | Security of plug-and-play QKD arrangements with finite resources |
---|---|
Author/s: |
|
Item Type: | Article |
Título de Revista/Publicación: | Quantum Information & Computation |
Date: | September 2013 |
ISSN: | 1533-7146 |
Volume: | 13 |
Subjects: | |
Freetext Keywords: | Finite resources, plug-and-play devices, QKD security |
Faculty: | E.T.S.I. Telecomunicación (UPM) |
Department: | Tecnologías Especiales Aplicadas a la Aeronáutica [hasta 2014] |
Creative Commons Licenses: | Recognition - No derivative works - Non commercial |
![]() Preview |
PDF
- Requires a PDF viewer, such as GSview, Xpdf or Adobe Acrobat Reader
Download (540kB) |
The security of a passive plug-and-play QKD arrangement in the case of finite (resources) key lengths is analysed. It is assumed that the eavesdropper has full access to the channel so an unknown and untrusted source is assumed. To take into account the security of the BB84 protocol under collective attacks within the framework of quantum adversaries, a full treatment provides the well-known equations for the secure key rate. A numerical simulation keeping a minimum number of initial parameters constant as the total error sought and the number of pulses is carried out. The remaining parameters are optimized to produce the maximum secure key rate. Two main strategies are addressed: with and without two-decoy-states including the optimization of signal to decoy relationship.
Item ID: | 26646 |
---|---|
DC Identifier: | https://oa.upm.es/26646/ |
OAI Identifier: | oai:oa.upm.es:26646 |
Official URL: | http://www.rintonpress.com/xxqic13/qic-13-910/0861... |
Deposited by: | Memoria Investigacion |
Deposited on: | 27 Jul 2014 09:52 |
Last Modified: | 22 Sep 2014 11:42 |