Security of quantum key distribution with arbitrary individual imperfections

被引:45
|
作者
Maroy, Oystein [1 ]
Lydersen, Lars
Skaar, Johannes
机构
[1] Norwegian Univ Sci & Technol, Dept Elect & Telecommun, NO-7491 Trondheim, Norway
来源
PHYSICAL REVIEW A | 2010年 / 82卷 / 03期
关键词
CRYPTOGRAPHY;
D O I
10.1103/PhysRevA.82.032337
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
We consider the security of the Bennett-Brassard 1984 protocol for quantum key distribution, with arbitrary individual imperfections simultaneously in the source and detectors. We provide the secure key generation rate and show that three parameters must be bounded to ensure security; the basis dependence of the source, a detector-blinding parameter, and a detector leakage parameter. The system may otherwise be completely uncharacterized and contain large losses.
引用
收藏
页数:7
相关论文
共 50 条
  • [21] Security of Post-selection based Continuous Variable Quantum Key Distribution against Arbitrary Attacks
    Walk, Nathan
    Ralph, Timothy C.
    Symul, Thomas
    Lam, Ping Koy
    2011 CONFERENCE ON LASERS AND ELECTRO-OPTICS (CLEO), 2011,
  • [22] Experimental study of secure quantum key distribution with source and detection imperfections
    Chen, Ye
    Huang, Chunfeng
    Chen, Zihao
    He, Wenjie
    Zhang, Chengxian
    Sun, Shihai
    Wei, Kejin
    PHYSICAL REVIEW A, 2022, 106 (02)
  • [23] Analysis of imperfections in practical continuous-variable quantum key distribution
    Jouguet, Paul
    Kunz-Jacques, Sebastien
    Diamanti, Eleni
    Leverrier, Anthony
    PHYSICAL REVIEW A, 2012, 86 (03):
  • [24] Temporal steering and security of quantum key distribution with mutually unbiased bases against individual attacks
    Bartkiewicz, Karol
    Cernoch, Antonin
    Lemr, Karel
    Miranowicz, Adam
    Nori, Franco
    PHYSICAL REVIEW A, 2016, 93 (06)
  • [25] Security against individual attacks for realistic quantum key distribution -: art. no. 052304
    Lütkenhaus, N
    PHYSICAL REVIEW A, 2000, 61 (05)
  • [26] Security of quantum key distribution with iterative sifting
    Tamaki, Kiyoshi
    Lo, Hoi-Kwong
    Mizutani, Akihiro
    Kato, Go
    Lim, Charles Ci Wen
    Azuma, Koji
    Curty, Marcos
    QUANTUM SCIENCE AND TECHNOLOGY, 2018, 3 (01):
  • [27] The security and recent technology of quantum key distribution
    Wang X.-B.
    Ying H.
    Ma H.-X.
    Peng C.-Z.
    Yang T.
    Pan J.-W.
    Frontiers of Physics in China, 2006, 1 (3): : 251 - 255
  • [28] Security analysis of quantum key distribution protocol
    Omine T.
    Yamada C.
    Miyagi K.
    Ichikawa S.
    IEEJ Transactions on Industry Applications, 2016, 136 (10) : 698 - 702
  • [29] Security of quantum key distribution with imperfect devices
    Gottesman, D
    Lo, HK
    Lütkenhaus, N
    Preskill, J
    2004 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, PROCEEDINGS, 2004, : 136 - 136
  • [30] Upgrading PPP security by quantum key distribution
    Ghernaouti-Helie, Solange
    Sfaxi, Mohamed Ali
    NETWORK CONTROL AND ENGINEERING FOR QOS, SECURITY AND MOBILITY, IV, 2007, 229 : 45 - +