Security proof of practical quantum key distribution with detection-efficiency mismatch
نویسندگان
چکیده
Quantum key distribution (QKD) protocols with threshold detectors are driving high-performance QKD demonstrations. The corresponding security proofs usually assume that all physical have the same detection efficiency. However, efficiencies of used in practice might show a mismatch depending on manufacturing and setup these detectors. A can also be induced as different spatial-temporal modes an incoming signal couple differently to detector. Here we develop method allows provide without usual assumption. Our take detection-efficiency into account having restrict attack strategy adversary. Especially, do not rely any photon-number cutoff signals such our proof is directly applicable practical situations. We illustrate for receiver designed polarization encoding sensitive number modes. In detector model, absence quantum interference between pair assumed. For protocol this perform characterized efficiency shows rate increases if loss due inefficiency assumed outside adversary's control, compared view where attributed action adversary.3 MoreReceived 16 April 2020Accepted 7 January 2021DOI:https://doi.org/10.1103/PhysRevResearch.3.013076Published by American Physical Society under terms Creative Commons Attribution 4.0 International license. Further work must maintain attribution author(s) published article's title, journal citation, DOI.Published SocietyPhysics Subject Headings (PhySH)Research AreasQuantum cryptographyQuantum Information
منابع مشابه
The Security of Practical Quantum Key Distribution
Valerio Scarani , Helle Bechmann-Pasquinucci , Nicolas J. Cerf , Miloslav Dušek , Norbert Lütkenhaus , Momtchil Peev 9 1 Centre for Quantum Technologies and Department of Physics, National University of Singapore, Singapore 2 Group of Applied Physics, University of Geneva, Geneva, Switzerland 3 University of Pavia, Dipartimento di Fisica “A. Volta”, Pavia, Italy 4 UCCI.IT, Rovagnate (LC), Italy...
متن کاملSimple security proof of quantum key distribution based on complementarity
We present an approach to the unconditional security of quantum key distribution protocols based on a complementarity argument. The approach is applicable to, but not limited to, every case that has been treated via the argument by Shor and Preskill based on entanglement distillation, with a benefit of decoupling of the error correction from the privacy amplification. It can also treat cases wi...
متن کاملSecurity of practical phase-coding quantum key distribution
Security proof of practical quantum key distribution (QKD) has attracted a lot of attentions in recent years. Most of real-life QKD implementations are based on phase-coding BB84 protocol, which usually uses Unbalanced Mach-Zehnder Interferometer (UMZI) as the information coder and decoder. However, the long arm and short arm of UMZI will introduce different loss in practical experimental reali...
متن کاملPractical Evaluation of Security for Quantum Key Distribution
Masahito Hayashi ∗ EARTO-SORST Quantum Computation and Information Project, JST 5-28-3, Hongo, Bunkyo-ku, Tokyo, 113-0033, Japan Superrobust Computation Project, Information Science and Technology Strategic Core (21st Century COE by MEXT) Graduate School of Information Science and Technology, The University of Tokyo 7-3-1, Hongo, Bunkyo-ku, Tokyo, 113-0033, Japan Abstract Many papers proved the...
متن کاملRandomness determines practical security of BB84 quantum key distribution
Unconditional security of the BB84 quantum key distribution protocol has been proved by exploiting the fundamental laws of quantum mechanics, but the practical quantum key distribution system maybe hacked by considering the imperfect state preparation and measurement respectively. Until now, different attacking schemes have been proposed by utilizing imperfect devices, but the general security ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Physical review research
سال: 2021
ISSN: ['2643-1564']
DOI: https://doi.org/10.1103/physrevresearch.3.013076