Decoy-state quantum key distribution with a leaky source
From MaRDI portal
Publication:5855055
Abstract: In recent years, there has been a great effort to prove the security of quantum key distribution (QKD) with a minimum number of assumptions. Besides its intrinsic theoretical interest, this would allow for larger tolerance against device imperfections in the actual implementations. However, even in this device-independent scenario, one assumption seems unavoidable, that is, the presence of a protected space devoid of any unwanted information leakage in which the legitimate parties can privately generate, process and store their classical data. In this paper we relax this unrealistic and hardly feasible assumption and introduce a general formalism to tackle the information leakage problem in most of existing QKD systems. More specifically, we prove the security of optical QKD systems using phase and intensity modulators in their transmitters, which leak the setting information in an arbitrary manner. We apply our security proof to cases of practical interest and show key rates similar to those obtained in a perfectly shielded environment. Our work constitutes a fundamental step forward in guaranteeing implementation security of quantum communication systems.
Recommendations
- Finite-key security analysis of the 1-decoy state QKD protocol with a leaky intensity modulator
- Security of quantum key distribution with imperfect devices
- Finite-key security analysis of quantum key distribution with imperfect light sources
- scientific article; zbMATH DE number 5989869
- Security of practical BB84 quantum key distribution
Cites work
- scientific article; zbMATH DE number 1579275 (Why is no real title available?)
- scientific article; zbMATH DE number 5320407 (Why is no real title available?)
- scientific article; zbMATH DE number 1775384 (Why is no real title available?)
- scientific article; zbMATH DE number 1825622 (Why is no real title available?)
- scientific article; zbMATH DE number 3222880 (Why is no real title available?)
- Communication Theory of Secrecy Systems*
- Linear programming. Foundations and extensions.
- Quantum cryptography
- Security analysis of an untrusted source for quantum key distribution: passive approach
- Security of quantum key distribution with imperfect devices
- Time-shift attack in practical quantum cryptosystems
- Weighted sums of certain dependent random variables
Cited in
(9)- Practical decoy-state quantum private queries against joint-measurement attack under weak coherent pulse sources
- Securing QKD links in the full Hilbert space
- Security of quantum key distribution with state-dependent imperfections
- An enhanced proposal on decoy-state measurement device-independent quantum key distribution
- Passive Decoy State Quantum Key Distribution
- Finite-key security analysis of the 1-decoy state QKD protocol with a leaky intensity modulator
- scientific article; zbMATH DE number 5989869 (Why is no real title available?)
- Finite-key security analysis of quantum key distribution with imperfect light sources
- Optimizing of decoy state quantum key distribution system based on phase coding
This page was built for publication: Decoy-state quantum key distribution with a leaky source
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5855055)