4.6 Article

Decoy-state quantum key distribution with a leaky source

期刊

NEW JOURNAL OF PHYSICS
卷 18, 期 -, 页码 -

出版社

IOP PUBLISHING LTD
DOI: 10.1088/1367-2630/18/6/065008

关键词

quantum key distribution; device-independent quantum key distribution; quantum communication; security analysis; information leakage; Trojan horse attacks

资金

  1. Galician Regional Government (program 'Ayudas para proyectos de investigacion desarrollados por investigadores emergentes') [EM2014/033]
  2. Galician Regional Government (consolidation of Research Units: AtlantTIC)
  3. Spanish Ministry of Economy and Competitiveness (MINECO)
  4. Fondo Europeo de Desarrollo Regional (FEDER) [TEC2014-54898-R]
  5. ImPACT Program of the Council for Science, Technology and Innovation (Cabinet Office, Government of Japan)
  6. project EMPIR [14IND05 MIQC2]
  7. EMPIR programme
  8. European Unions Horizon research and innovation programme

向作者/读者索取更多资源

In recent years, there has been a great effort to prove the security of quantum key distribution (QKD) with a minimum number of assumptions. Besides its intrinsic theoretical interest, this would allow for larger tolerance against device imperfections in the actual implementations. However, even in this device-independent scenario, one assumption seems unavoidable, that is, the presence of a protected space devoid of any unwanted information leakage in which the legitimate parties can privately generate, process and store their classical data. In this paper we relax this unrealistic and hardly feasible assumption and introduce a general formalism to tackle the information leakage problem in most of existing QKD systems. More specifically, we prove the security of optical QKD systems using phase and intensity modulators in their transmitters, which leak the setting information in an arbitrary manner. We apply our security proof to cases of practical interest and show key rates similar to those obtained in a perfectly shielded environment. Our work constitutes a fundamental step forward in guaranteeing implementation security of quantum communication systems.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据