Abstract. We propose a proof of the security of a practical BB84 quantum key distribution protocol against enemies with unlimited computational power. The considered protocol uses interactive key distillation, and the proof holds for implementations using imperfect optical devices.
Similar content being viewed by others
Author information
Authors and Affiliations
Rights and permissions
About this article
Cite this article
Inamori, . Security of Practical BB84 Quantum Key Distribution . Algorithmica 34, 366–371 (2002). https://doi.org/10.1007/s00453-002-0984-3
Issue Date:
DOI: https://doi.org/10.1007/s00453-002-0984-3