Papers
Topics
Authors
Recent
Search
2000 character limit reached

QKD security proofs for decoy-state BB84: protocol variations, proof techniques, gaps and limitations

Published 14 Feb 2025 in quant-ph | (2502.10340v2)

Abstract: We review the current status of security proofs for practical decoy-state Quantum Key Distribution using the BB84 protocol, focusing on optical implementations with weak coherent pulses and threshold photodetectors. The primary aim of this review is to highlight gaps in the existing literature. Such gaps may arise, for instance, from mismatches between detailed protocol specifications and proof technique elements, reliance on earlier results based on different assumptions, or protocol choices that overlook real world requirements. While substantial progress has been made, our overview draws attention to the details that still demand careful attention.

Summary

Paper to Video (Beta)

Whiteboard

No one has generated a whiteboard explanation for this paper yet.

Open Problems

We haven't generated a list of open problems mentioned in this paper yet.

Continue Learning

We haven't generated follow-up questions for this paper yet.

Collections

Sign up for free to add this paper to one or more collections.