A finite-key security proof for decoy-state BB84 against coherent attacks that incorporates correlations from Alice's encoder with only partial characterization.
Phase error estimation for passive detection setups with imperfections and memory effects
3 Pith papers cite this work. Polarity classification is still indexing.
citation-role summary
citation-polarity summary
fields
quant-ph 3years
2026 3verdicts
UNVERDICTED 3roles
method 1polarities
use method 1representative citing papers
Rigorous security proofs for variable-length QKD, phase-error bounding with imperfect detectors, marginal-constrained entropy accumulation, and authentication reductions place practical QKD on firmer mathematical ground.
A numerical framework proves finite-key security for practical decoy-state QKD systems with transmitter and receiver imperfections including non-IID signals.
citing papers explorer
-
Security of decoy-state quantum key distribution with correlated bit-and-basis encoders
A finite-key security proof for decoy-state BB84 against coherent attacks that incorporates correlations from Alice's encoder with only partial characterization.
-
Rigorous Security Proofs for Practical Quantum Key Distribution
Rigorous security proofs for variable-length QKD, phase-error bounding with imperfect detectors, marginal-constrained entropy accumulation, and authentication reductions place practical QKD on firmer mathematical ground.
-
Numerical security analysis for practical quantum key distribution
A numerical framework proves finite-key security for practical decoy-state QKD systems with transmitter and receiver imperfections including non-IID signals.