|国家预印本平台
首页|Protocol-level description and self-contained security proof of decoy-state BB84 QKD protocol

Protocol-level description and self-contained security proof of decoy-state BB84 QKD protocol

Protocol-level description and self-contained security proof of decoy-state BB84 QKD protocol

来源:Arxiv_logoArxiv
英文摘要

In this paper, we present a flowchart-based description of the decoy-state BB84 quantum key distribution (QKD) protocol and provide a step-by-step, self-contained information-theoretic security proof for this protocol within the universal composable security framework. As a result, our proof yields a key rate consistent with previous findings. Importantly, unlike all the prior security proofs, our approach offers a fully rigorous and mathematical justification for achieving the key rate with the claimed correctness and secrecy parameters, thereby representing a significant step toward the formal certification of QKD systems.

Go Kato、Akihiro Mizutani、Toshihiko Sasaki

通信无线通信

Go Kato,Akihiro Mizutani,Toshihiko Sasaki.Protocol-level description and self-contained security proof of decoy-state BB84 QKD protocol[EB/OL].(2025-04-29)[2025-05-23].https://arxiv.org/abs/2504.20417.点此复制

评论