Skip to main content
Log in

Security of Practical BB84 Quantum Key Distribution

  • Published:
Algorithmica Aims and scope Submit manuscript

Abstract. We propose a proof of the security of a practical BB84 quantum key distribution protocol against enemies with unlimited computational power. The considered protocol uses interactive key distillation, and the proof holds for implementations using imperfect optical devices.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

About this article

Cite this article

Inamori, . Security of Practical BB84 Quantum Key Distribution . Algorithmica 34, 366–371 (2002). https://doi.org/10.1007/s00453-002-0984-3

Download citation

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00453-002-0984-3

Navigation