5 research outputs found

    Concise and Tight Security Analysis of the Bennett-Brassard 1984 Protocol with Finite Key Lengths

    Full text link
    We present a tight security analysis of the Bennett-Brassard 1984 protocol taking into account the finite size effect of key distillation, and achieving unconditional security. We begin by presenting a concise analysis utilizing the normal approximation of the hypergeometric function. Then next we show that a similarly tight bound can also be obtained by a rigorous argument without relying on any approximation. In particular, for the convenience of experimentalists who wish to evaluate the security of their QKD systems, we also give explicit procedures of our key distillation, and also show how to calculate the secret key rate and the security parameter from a given set of experimental parameters. Besides the exact values of key rates and security parameters, we also present how to obtain their rough estimates using the normal approximation.Comment: 40 pages, 4 figures, revised arguments on security, and detailed explanaions on how to use theoretical result

    Tokyo QKD network and the evolution to secure photonic network

    Full text link
    A novel secure communication network with quantum key distribution in a metropolitan area is reported. Different QKD schemes are integrated to demonstrate secure TV conferencing over a distance 45km, stable long-term operation, and application to secure mobile phones. © OSA/ CLEO 2011
    corecore