2018
DOI: 10.1088/1367-2630/aad839
|View full text |Cite
|
Sign up to set email alerts
|

Finite-key security analysis for quantum key distribution with leaky sources

Abstract: Security proofs of quantum key distribution (QKD) typically assume that the devices of the legitimate users are perfectly shielded from the eavesdropper. This assumption is, however, very hard to meet in practice, and thus the security of current QKD implementations is not guaranteed. Here, we fill this gap by providing a finite-key security analysis for QKD which is valid against arbitrary information leakage from the state preparation process of the legitimate users. For this, we extend the techniques introd… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

3
72
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6

Relationship

2
4

Authors

Journals

citations
Cited by 45 publications
(75 citation statements)
references
References 39 publications
(134 reference statements)
3
72
0
Order By: Relevance
“…Specially, we have simulated the secret key rate under three particular examples of THA, where Eve sends coherent pulses of light to probe the intensity modulators and phase modulators of the legitimate parties. Similar to the analysis presented in [25], we have introduced an additional post-processing step in the actual protocol where Alice and Bob sacrifice part of their data. This step is necessary for the security proof to go through.…”
Section: Conclusion and Discussionmentioning
confidence: 99%
See 4 more Smart Citations
“…Specially, we have simulated the secret key rate under three particular examples of THA, where Eve sends coherent pulses of light to probe the intensity modulators and phase modulators of the legitimate parties. Similar to the analysis presented in [25], we have introduced an additional post-processing step in the actual protocol where Alice and Bob sacrifice part of their data. This step is necessary for the security proof to go through.…”
Section: Conclusion and Discussionmentioning
confidence: 99%
“…Eve's systems [25]. As a result, the parameter D j A j B ,ss Z,nm does not depend on the basis Z nor on the photon number n, m. Therefore, we shall denote it by D j A j B ,ss .…”
Section: Conclusion and Discussionmentioning
confidence: 99%
See 3 more Smart Citations