Security analysis of the decoy method with the Bennett-Brassard 1984 protocol for finite key lengths
10.1088/1367-2630/16/6/063009
Saved in:
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Article |
Published: |
Institute of Physics Publishing
2020
|
Subjects: | |
Online Access: | https://scholarbank.nus.edu.sg/handle/10635/180180 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | National University of Singapore |
id |
sg-nus-scholar.10635-180180 |
---|---|
record_format |
dspace |
spelling |
sg-nus-scholar.10635-1801802023-11-01T08:47:50Z Security analysis of the decoy method with the Bennett-Brassard 1984 protocol for finite key lengths Hayashi, M Nakayama, R CENTRE FOR QUANTUM TECHNOLOGIES Error correction BB84 protocol decoy method finite-key length Interval estimation per cent point Phase error correction Quantum cryptography 10.1088/1367-2630/16/6/063009 New Journal of Physics 16 63009 2020-10-26T07:23:27Z 2020-10-26T07:23:27Z 2014 Article Hayashi, M, Nakayama, R (2014). Security analysis of the decoy method with the Bennett-Brassard 1984 protocol for finite key lengths. New Journal of Physics 16 : 63009. ScholarBank@NUS Repository. https://doi.org/10.1088/1367-2630/16/6/063009 1367-2630 https://scholarbank.nus.edu.sg/handle/10635/180180 Attribution 4.0 International http://creativecommons.org/licenses/by/4.0/ Institute of Physics Publishing Unpaywall 20201031 |
institution |
National University of Singapore |
building |
NUS Library |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
NUS Library |
collection |
ScholarBank@NUS |
topic |
Error correction BB84 protocol decoy method finite-key length Interval estimation per cent point Phase error correction Quantum cryptography |
spellingShingle |
Error correction BB84 protocol decoy method finite-key length Interval estimation per cent point Phase error correction Quantum cryptography Hayashi, M Nakayama, R Security analysis of the decoy method with the Bennett-Brassard 1984 protocol for finite key lengths |
description |
10.1088/1367-2630/16/6/063009 |
author2 |
CENTRE FOR QUANTUM TECHNOLOGIES |
author_facet |
CENTRE FOR QUANTUM TECHNOLOGIES Hayashi, M Nakayama, R |
format |
Article |
author |
Hayashi, M Nakayama, R |
author_sort |
Hayashi, M |
title |
Security analysis of the decoy method with the Bennett-Brassard 1984 protocol for finite key lengths |
title_short |
Security analysis of the decoy method with the Bennett-Brassard 1984 protocol for finite key lengths |
title_full |
Security analysis of the decoy method with the Bennett-Brassard 1984 protocol for finite key lengths |
title_fullStr |
Security analysis of the decoy method with the Bennett-Brassard 1984 protocol for finite key lengths |
title_full_unstemmed |
Security analysis of the decoy method with the Bennett-Brassard 1984 protocol for finite key lengths |
title_sort |
security analysis of the decoy method with the bennett-brassard 1984 protocol for finite key lengths |
publisher |
Institute of Physics Publishing |
publishDate |
2020 |
url |
https://scholarbank.nus.edu.sg/handle/10635/180180 |
_version_ |
1781792375993008128 |