A finite-key security proof for decoy-state BB84 against coherent attacks that incorporates correlations from Alice's encoder with only partial characterization.
11 Lifting security from bounded to unbounded correlations The following lemma, which is model-independent, provides the mechanism for step 3
1 Pith paper cite this work. Polarity classification is still indexing.
1
Pith paper citing it
citation-role summary
background 1
citation-polarity summary
fields
quant-ph 1years
2026 1verdicts
UNVERDICTED 1roles
background 1polarities
background 1representative citing papers
citing papers explorer
-
Security of decoy-state quantum key distribution with correlated bit-and-basis encoders
A finite-key security proof for decoy-state BB84 against coherent attacks that incorporates correlations from Alice's encoder with only partial characterization.