2023
DOI: 10.3390/e25111556
|View full text |Cite
|
Sign up to set email alerts
|

Security of the Decoy-State BB84 Protocol with Imperfect State Preparation

Aleksei Reutov,
Andrey Tayduganov,
Vladimir Mayboroda
et al.

Abstract: The quantum key distribution (QKD) allows two remote users to share a common information-theoretic secure secret key. In order to guarantee the security of a practical QKD implementation, the physical system has to be fully characterized and all deviations from the ideal protocol due to various imperfections of realistic devices have to be taken into account in the security proof. In this work, we study the security of the efficient decoy-state BB84 QKD protocol in the presence of the source flaws, caused by i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 44 publications
0
1
0
Order By: Relevance
“…In fact, the QBER values reported include this contribution, which are therefore compatible with the implementation of a secure QKD protocol. It is worth noticing that imperfect state preparation can present a security impairment that, when taken into account, may significantly reduce the distance up to which secret key generation is possible [35]. However, such security implications can be overcome by calibrating and monitoring the detection efficiency of the SPDs [36].…”
Section: Discussionmentioning
confidence: 99%
“…In fact, the QBER values reported include this contribution, which are therefore compatible with the implementation of a secure QKD protocol. It is worth noticing that imperfect state preparation can present a security impairment that, when taken into account, may significantly reduce the distance up to which secret key generation is possible [35]. However, such security implications can be overcome by calibrating and monitoring the detection efficiency of the SPDs [36].…”
Section: Discussionmentioning
confidence: 99%