Abstract.
Quantum key distribution bears the promise to set new standards in secure communication. However, on the way from the theoretical principles to the practical implementation we find many obstacles that need to be taken care of. In this article I show how to obtain a key with a realistic setup such that the security of this key can be proven for an important restricted class of eavesdropping attacks, namely the individual attacks.
Article PDF
Similar content being viewed by others
Avoid common mistakes on your manuscript.
Author information
Authors and Affiliations
Additional information
Received: 15 June 1999 / Published online: 3 November 1999
Rights and permissions
About this article
Cite this article
Lütkenhaus, N. Quantum key distribution: theory for application. Appl Phys B 69, 395–400 (1999). https://doi.org/10.1007/s003400050825
Published:
Issue Date:
DOI: https://doi.org/10.1007/s003400050825