Security of quantum key distribution with source and detection imperfections

18Citations
Citations of this article
10Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

In practice, the device imperfections might introduce deviations from the idealized models used in the security proofs of quantum key distribution (QKD). This requires the refined security analysis for practical QKD. However, in most of previous analysis, the imperfections are individually considered with different models. Here, we derive a security analysis which takes both the source and detection imperfections into account. Particularly, the efficiency mismatch in the detection and a number of flaws in the source (such as, inaccuracy of encoded quantum state, side-channel of source, distinguishable decoy states, Trojan-horse, and so on) are analyzed in a general security model. Then the performance of the QKD system with the devices imperfections is evaluated. Our results present an important step toward the practical security of QKD wit realistic devices.

Cite

CITATION STYLE

APA

Sun, S., & Xu, F. (2021). Security of quantum key distribution with source and detection imperfections. New Journal of Physics, 23(2). https://doi.org/10.1088/1367-2630/abdf9b

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free