 |
|
Subscribers:
to view the full text of a paper, click on the title of the paper. If you
have any problem to access the full text, please check with your librarian
or contact
qic@rintonpress.com
To subscribe to QIC, please click
Here.
Quantum
Information and Computation
ISSN: 1533-7146
published since 2001
|
Vol.13 No.9&10 September 2013 |
Security of plug-and-play QKD arrangements with finite resources (pp0861-0879)
Pedro J. Salas
doi:
https://doi.org/10.26421/QIC13.9-10-8
Abstracts:
The security of a passive plug-and-play QKD arrangement
in the case of finite (resources) key lengths is analysed. It is assumed
that the eavesdropper has full access to the channel so an unknown and
untrusted source is assumed. To take into account the security of the
BB84 protocol under collective attacks within the framework of quantum
adversaries, a full treatment provides the well-known equations for the
secure key rate. A numerical simulation keeping a minimum number of
initial parameters constant as the total error sought and the number of
pulses is carried out. The remaining parameters are optimized to produce
the maximum secure key rate. Two main strategies are addressed: with and
without two-decoy-states including the optimization of signal to decoy
relationship.
Key words:
plug-and-play devices, QKD security |
|