pith. machine review for the scientific record. sign in

arxiv: quant-ph/0612121 · v3 · submitted 2006-12-14 · 🪐 quant-ph

Recognition: unknown

Security of decoy-state quantum key distribution with inexactly controlled source

Authors on Pith no claims yet
classification 🪐 quant-ph
keywords decoy-stateerrorquantumresultsecurityappliescoherentcontrolled
0
0 comments X
read the original abstract

We show the unconditional security of decoy-state method quantum cryptography with whatever intensity error pattern provided that the error is not too large. Our result immediately applies to the existing experimental data. Our result is not limitted to coherent states.

This paper has not been read by Pith yet.

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.