2016
DOI: 10.1088/1367-2630/18/6/065008
|View full text |Cite
|
Sign up to set email alerts
|

Decoy-state quantum key distribution with a leaky source

Abstract: In recent years, there has been a great effort to prove the security of quantum key distribution (QKD) with a minimum number of assumptions. Besides its intrinsic theoretical interest, this would allow for larger tolerance against device imperfections in the actual implementations. However, even in this device-independent scenario, one assumption seems unavoidable, that is, the presence of a protected space devoid of any unwanted information leakage in which the legitimate parties can privately generate, proce… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
127
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 90 publications
(130 citation statements)
references
References 72 publications
1
127
0
Order By: Relevance
“…The wavelength filter provides close to no loss at its central wavelength and approximately 80 dB of loss outside of this. By combining a small number of optical components – a 40 dB attenuator, 60 dB isolator and wavelength filter – sufficient total round trip attenuation can be achieved (on the order of 200 dB including component reflectivity) to make the possible information leakage from Trojan horse attacks negligible 21 .
Figure 7Optical performance of ( a ) isolators and ( b ) wavelength filters, used to provide protection against Trojan horse attacks.
…”
Section: Methodsmentioning
confidence: 99%
“…The wavelength filter provides close to no loss at its central wavelength and approximately 80 dB of loss outside of this. By combining a small number of optical components – a 40 dB attenuator, 60 dB isolator and wavelength filter – sufficient total round trip attenuation can be achieved (on the order of 200 dB including component reflectivity) to make the possible information leakage from Trojan horse attacks negligible 21 .
Figure 7Optical performance of ( a ) isolators and ( b ) wavelength filters, used to provide protection against Trojan horse attacks.
…”
Section: Methodsmentioning
confidence: 99%
“…Note that this framework analyses the effect of the phase modulator on the state. The effect of an intensity modulator, which is used in decoy-state QKD, is analysed in [22].…”
Section: Preliminary Notionsmentioning
confidence: 99%
“…This attack has previously been analysed by Lucamarini et al [18,22]. They assume that Eve uses a coherent state to probe the system, and describe using a one-way attenuating filter at the entry-point of Alice's apparatus as a defense.…”
Section: Introductionmentioning
confidence: 99%
“…Then apply a triangle inequality (5) to divide the security problems into two parts, as shown in (5)(6)(7)(8). 1 1 1 ABE ABE ABE ABE ABE ABE 2 2 2 tr tr tr…”
Section: Overview Of Trace Distance Security Criterionmentioning
confidence: 99%
“…On the other hand, numerous works have been made to remove real device imperfections from theoretical security proofs, such as MDI-QKD mentioned above, and Reference 6 to remove attacks on device imperfections. However, since 2009, H. P. Yuen, who theoretically discovered the squeezed state of coherent light 7 as well as the theories of M-ary quantum detection and parameter estimation 8,9 , has been warning that even the real devices work perfectly along the standardized theories, there are problems even in theories 10,11 .…”
Section: Introductionmentioning
confidence: 99%