Abstract
By simulating four quantum key distribution (QKD) experiments and analyzing one decoy-state QKD experiment, we compare two data postprocessing schemes based on security against individual attack by Lütkenhaus, and unconditional security analysis by Gottesman-Lo-Lütkenhaus-Preskill. Our results show that these two schemes yield close performances. In QKD, since unconditional security is highly sought after, we conclude that one is better off considering unconditional security, rather than restricting to individual attacks.
- Received 3 August 2006
DOI:https://doi.org/10.1103/PhysRevA.74.052325
©2006 American Physical Society