2015
DOI: 10.1103/physreva.92.032305
|View full text |Cite
|
Sign up to set email alerts
|

Experimental quantum key distribution with source flaws

Abstract: Decoy-state quantum key distribution (QKD) is a standard technique in current quantum cryptographic implementations. Unfortunately, existing experiments have two important drawbacks: the state preparation is assumed to be perfect without errors and the employed security proofs do not fully consider the finite-key effects for general attacks. These two drawbacks mean that existing experiments are not guaranteed to be secure in practice. Here, we perform an experiment that for the first time shows secure QKD wit… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
68
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 86 publications
(71 citation statements)
references
References 66 publications
0
68
0
Order By: Relevance
“…131, where the authors implemented decoy-state QKD with imperfect state preparation and employed tight finite-key security bounds with composable security against coherent attacks. The work in ref.…”
Section: Mdi-qkdmentioning
confidence: 99%
“…131, where the authors implemented decoy-state QKD with imperfect state preparation and employed tight finite-key security bounds with composable security against coherent attacks. The work in ref.…”
Section: Mdi-qkdmentioning
confidence: 99%
“…Indeed, as already shown in MDI-QKD [29,[38][39][40], if Alice and Bob use the same intensity settings, they might be in a situation where it is convenient for them to symmetrize the channels losses by increasing the loss in one of the channels, in order to enhance the key rate. In doing so, the intensities of the pulses arriving at the central node are now of similar magnitude, which results in an improvement of the key rate.…”
Section: Symmetric Intensitiesmentioning
confidence: 98%
“…In doing so, the intensities of the pulses arriving at the central node are now of similar magnitude, which results in an improvement of the key rate. However, if they use different intensity settings, that is no longer the case [29,[38][39][40]. The same happens in the TF-QKD scheme introduced in [19].…”
Section: Symmetric Intensitiesmentioning
confidence: 99%
“…There are finitely many such histories, and each of them as a probability associated with it. This can be expressed more formally in the language of discrete probability theory 13 by saying that Ω forms the sample space of a discrete probability space ( ) W P , , on which a probability mass function P is defined such that ( ) w P is the probability of a history ω. Note that by choosing W = W ¼Q AB , we also include impossible combinations of a b , , K, J.…”
Section: Appendix C Sampling and Abort Probability Calculation For Lmentioning
confidence: 99%
“…The framework used in the aforementioned works, relying on some fairly technical results 5 , represents the current state-of-the-art in the level of mathematical rigor for QKD security proofs. These theoretical advances have led to experimental implementations [12][13][14] with finite-key analysis.…”
Section: Introductionmentioning
confidence: 99%