A finite-key security proof for decoy-state BB84 against coherent attacks that incorporates correlations from Alice's encoder with only partial characterization.
Title resolution pending
1 Pith paper cite this work. Polarity classification is still indexing.
1
Pith paper citing it
citation-role summary
method 1
citation-polarity summary
fields
quant-ph 1years
2026 1verdicts
UNVERDICTED 1roles
method 1polarities
use method 1representative citing papers
citing papers explorer
-
Security of decoy-state quantum key distribution with correlated bit-and-basis encoders
A finite-key security proof for decoy-state BB84 against coherent attacks that incorporates correlations from Alice's encoder with only partial characterization.