A proof of the security of quantum key distribution

94Citations
Citations of this article
93Readers
Mendeley users who have this article in their library.
Get full text

Abstract

We prove the security of theoretical quantum key distribution against the most general attacks which can be performed on the channel, by an eavesdropper who has unlimited computation abilities, and the full power allowed by the rules of classical and quantum physics. A key created that way can then be used to transmit secure messages such that their security is also unaffected in the future. © International Association for Cryptologic Research 2006.

Cite

CITATION STYLE

APA

Biham, E., Boyer, M., Boykin, P. O., Mor, T., & Roychowdhury, V. (2006). A proof of the security of quantum key distribution. Journal of Cryptology, 19(4), 381–439. https://doi.org/10.1007/s00145-005-0011-3

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free