Unconditional security in Quantum Cryptography
Abstract
Basic techniques to prove the unconditional security of quantum cryptography are described. They are applied to a quantum key distribution protocol proposed by Bennett and Brassard in 1984. The proof considers a practical variation on the protocol in which the channel is noisy and photons may be lost during the transmission. The initial coding into the channel must be perfect (i.e., exactly as described in the protocol). No restriction is imposed on the detector used at the receiving side of the channel, except that whether or not the received system is detected must be independent of the basis used to measure this system.
- Publication:
-
arXiv e-prints
- Pub Date:
- February 1998
- DOI:
- 10.48550/arXiv.quant-ph/9802025
- arXiv:
- arXiv:quant-ph/9802025
- Bibcode:
- 1998quant.ph..2025M
- Keywords:
-
- Quantum Physics
- E-Print:
- Version 5: This is an improved version of the paper that was published in JACM. Previous version: Revtex 18 pages. An appendix which summarizes the notations was added. As in the previous version, the proof uses the POVM model to prove the security of quantum key distribution against all attacks. The proof assumes a noisy channel and an imperfect measuring apparatus