Unconditional security of practical quantum key distribution

Highlight Paper


We present a complete protocol for BB84 quantum key distribution for a realistic setting (noise, loss, multi-photon signals of the source) that covers many of todays experimental implementations. The security of this protocol is shown against an eavesdropper having unrestricted power to manipulate the signals coherently on their path from sender to receiver. The protocol and the security proof take into account the effects concerning the finite size of the generated key. This paper is identical to the preprint arXiv:quant-ph/0107017, which was finalized in 2001. Therefore, some of the more recent developments, including the question of composability, are not addressed.


03.67.Dd Quantum cryptography 


21.20.Kd Quantum key distribution 22.70.+S Security proofs 

Copyright information

© EDP Sciences/Società Italiana di Fisica/Springer-Verlag 2007

Authors and Affiliations

  1. 1.Centre for Quantum Computation, Clarendon LaboratoryOxfordUK
  2. 2.Helsinki Institute of PhysicsHelsinkiFinland
  3. 3.Computer Science Department, Maharishi University of ManagementNEC Research InstitutePrincetonUSA

Personalised recommendations