Loading...

Tight security bounds for decoy-state quantum key distribution

The BB84 quantum key distribution (QKD) combined with decoy-state method is currently the most practical protocol, which has been proved secure against general attacks in the finite-key regime. Thereinto, statistical fluctuation analysis methods are very important in dealing with finite-key effects,...

Fuld beskrivelse

Na minha lista:
Bibliografiske detaljer
Udgivet i:Sci Rep
Main Authors: Yin, Hua-Lei, Zhou, Min-Gang, Gu, Jie, Xie, Yuan-Mei, Lu, Yu-Shuo, Chen, Zeng-Bing
Format: Artigo
Sprog:Inglês
Udgivet: Nature Publishing Group UK 2020
Fag:
Online adgang:https://ncbi.nlm.nih.gov/pmc/articles/PMC7458928/
https://ncbi.nlm.nih.gov/pubmed/32868774
https://ncbi.nlm.nih.govhttp://dx.doi.org/10.1038/s41598-020-71107-6
Tags: Tilføj Tag
Ingen Tags, Vær først til at tagge denne postø!