Security analysis of the decoy method with the Bennett-Brassard 1984 protocol for finite key lengths

10.1088/1367-2630/16/6/063009

Saved in:
Bibliographic Details
Main Authors: Hayashi, M, Nakayama, R
Other Authors: CENTRE FOR QUANTUM TECHNOLOGIES
Format: Article
Published: Institute of Physics Publishing 2020
Subjects:
Online Access:https://scholarbank.nus.edu.sg/handle/10635/180180
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: National University of Singapore
id sg-nus-scholar.10635-180180
record_format dspace
spelling sg-nus-scholar.10635-1801802023-11-01T08:47:50Z Security analysis of the decoy method with the Bennett-Brassard 1984 protocol for finite key lengths Hayashi, M Nakayama, R CENTRE FOR QUANTUM TECHNOLOGIES Error correction BB84 protocol decoy method finite-key length Interval estimation per cent point Phase error correction Quantum cryptography 10.1088/1367-2630/16/6/063009 New Journal of Physics 16 63009 2020-10-26T07:23:27Z 2020-10-26T07:23:27Z 2014 Article Hayashi, M, Nakayama, R (2014). Security analysis of the decoy method with the Bennett-Brassard 1984 protocol for finite key lengths. New Journal of Physics 16 : 63009. ScholarBank@NUS Repository. https://doi.org/10.1088/1367-2630/16/6/063009 1367-2630 https://scholarbank.nus.edu.sg/handle/10635/180180 Attribution 4.0 International http://creativecommons.org/licenses/by/4.0/ Institute of Physics Publishing Unpaywall 20201031
institution National University of Singapore
building NUS Library
continent Asia
country Singapore
Singapore
content_provider NUS Library
collection ScholarBank@NUS
topic Error correction
BB84 protocol
decoy method
finite-key length
Interval estimation
per cent point
Phase error correction
Quantum cryptography
spellingShingle Error correction
BB84 protocol
decoy method
finite-key length
Interval estimation
per cent point
Phase error correction
Quantum cryptography
Hayashi, M
Nakayama, R
Security analysis of the decoy method with the Bennett-Brassard 1984 protocol for finite key lengths
description 10.1088/1367-2630/16/6/063009
author2 CENTRE FOR QUANTUM TECHNOLOGIES
author_facet CENTRE FOR QUANTUM TECHNOLOGIES
Hayashi, M
Nakayama, R
format Article
author Hayashi, M
Nakayama, R
author_sort Hayashi, M
title Security analysis of the decoy method with the Bennett-Brassard 1984 protocol for finite key lengths
title_short Security analysis of the decoy method with the Bennett-Brassard 1984 protocol for finite key lengths
title_full Security analysis of the decoy method with the Bennett-Brassard 1984 protocol for finite key lengths
title_fullStr Security analysis of the decoy method with the Bennett-Brassard 1984 protocol for finite key lengths
title_full_unstemmed Security analysis of the decoy method with the Bennett-Brassard 1984 protocol for finite key lengths
title_sort security analysis of the decoy method with the bennett-brassard 1984 protocol for finite key lengths
publisher Institute of Physics Publishing
publishDate 2020
url https://scholarbank.nus.edu.sg/handle/10635/180180
_version_ 1781792375993008128