Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
131 tokens/sec
GPT-4o
10 tokens/sec
Gemini 2.5 Pro Pro
47 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

QKD security proofs for decoy-state BB84: protocol variations, proof techniques, gaps and limitations (2502.10340v2)

Published 14 Feb 2025 in quant-ph

Abstract: We review the current status of security proofs for practical decoy-state Quantum Key Distribution using the BB84 protocol, focusing on optical implementations with weak coherent pulses and threshold photodetectors. The primary aim of this review is to highlight gaps in the existing literature. Such gaps may arise, for instance, from mismatches between detailed protocol specifications and proof technique elements, reliance on earlier results based on different assumptions, or protocol choices that overlook real world requirements. While substantial progress has been made, our overview draws attention to the details that still demand careful attention.

Summary

We haven't generated a summary for this paper yet.