Security of the Decoy-State BB84 Protocol with Imperfect State Preparation

10Citations
Citations of this article
17Readers
Mendeley users who have this article in their library.

Abstract

The quantum key distribution (QKD) allows two remote users to share a common information-theoretic secure secret key. In order to guarantee the security of a practical QKD implementation, the physical system has to be fully characterized and all deviations from the ideal protocol due to various imperfections of realistic devices have to be taken into account in the security proof. In this work, we study the security of the efficient decoy-state BB84 QKD protocol in the presence of the source flaws, caused by imperfect intensity and polarization modulation. We investigate the non-Poissonian photon-number statistics due to coherent-state intensity fluctuations and the basis-dependence of the source due to non-ideal polarization state preparation. The analysis is supported by the experimental characterization of intensity and phase distributions.

Cite

CITATION STYLE

APA

Reutov, A., Tayduganov, A., Mayboroda, V., & Fat’yanov, O. (2023). Security of the Decoy-State BB84 Protocol with Imperfect State Preparation. Entropy, 25(11). https://doi.org/10.3390/e25111556

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free