2014
DOI: 10.1103/physreva.90.052314
|View full text |Cite
|
Sign up to set email alerts
|

Loss-tolerant quantum cryptography with imperfect sources

Abstract: In principle, quantum key distribution (QKD) offers unconditional security based on the laws of physics. In practice, flaws in the state preparation undermine the security of QKD systems, as standard theoretical approaches to deal with state preparation flaws are not loss-tolerant. An eavesdropper can enhance and exploit such imperfections through quantum channel loss, thus dramatically lowering the key generation rate. Crucially, the security analyses of most existing QKD experiments are rather unrealistic as… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
280
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
7
1
1

Relationship

2
7

Authors

Journals

citations
Cited by 175 publications
(280 citation statements)
references
References 52 publications
0
280
0
Order By: Relevance
“…Furthermore, note that Bob could even remove the phase modulator within his LON. If Alice sends him only three different states, it can be shown that this scenario (i.e., without phase modulator on Bob's side) would be completely equivalent to that of the three-state protocol [51,52]. According to the results in [52] the expected performance in this case would be basically the same as that of the original situation where Alice and Bob use four different states.…”
Section: Security Assumptionsmentioning
confidence: 99%
“…Furthermore, note that Bob could even remove the phase modulator within his LON. If Alice sends him only three different states, it can be shown that this scenario (i.e., without phase modulator on Bob's side) would be completely equivalent to that of the three-state protocol [51,52]. According to the results in [52] the expected performance in this case would be basically the same as that of the original situation where Alice and Bob use four different states.…”
Section: Security Assumptionsmentioning
confidence: 99%
“…The security of MDI-QKD as well as BB84 based on S-LD has been proven with decoy state method [23]. Hence, it has been convinced that if the source can be well characterized (for example the source flaws could be taken care of with the loss-tolerant QKD protocol [24]), perfect security can still be obtained.…”
Section: Introductionmentioning
confidence: 99%
“…It is important for not only weak coherent pulse-based protocols, but also, for instance, parametric down-conversion-based protocols [35]. And continuous or discrete phase randomization is also crucial for the loss-tolerant protocol [24]. In fact, without the phase randomization, the performance of a quantum communication protocol will be dramatically reduced in distance and key rate [31].…”
Section: Introductionmentioning
confidence: 99%
“…, then the operator M fail is the same for both bases [11]. Here, M bα represents the POVM element associated to the detection of the bit value b in the basis α, and the operator M fail represents the failure of outputting a bit value.…”
Section: Assumptions and Definitionsmentioning
confidence: 99%