Please use this identifier to cite or link to this item:
https://doi.org/10.1088/1367-2630/17/9/093011
DC Field | Value | |
---|---|---|
dc.title | Finite-key security analysis of quantum key distribution with imperfect light sources | |
dc.contributor.author | Mizutani, A | |
dc.contributor.author | Curty, M | |
dc.contributor.author | Lim, C.C.W | |
dc.contributor.author | Imoto, N | |
dc.contributor.author | Tamaki, K | |
dc.date.accessioned | 2020-10-23T08:10:36Z | |
dc.date.available | 2020-10-23T08:10:36Z | |
dc.date.issued | 2015 | |
dc.identifier.citation | Mizutani, A, Curty, M, Lim, C.C.W, Imoto, N, Tamaki, K (2015). Finite-key security analysis of quantum key distribution with imperfect light sources. New Journal of Physics 17 (9) : 93011. ScholarBank@NUS Repository. https://doi.org/10.1088/1367-2630/17/9/093011 | |
dc.identifier.issn | 1367-2630 | |
dc.identifier.uri | https://scholarbank.nus.edu.sg/handle/10635/179649 | |
dc.description.abstract | In recent years, the gap between theory and practice in quantum key distribution (QKD) has been significantly narrowed, particularly for QKD systems with arbitrarily flawed optical receivers. The status for QKD systems with imperfect light sources is however less satisfactory, in the sense that the resulting secure key rates are often overly dependent on the quality of state preparation. This is especially the case when the channel loss is high. Very recently, to overcome this limitation, Tamaki et al proposed a QKD protocol based on the so-called 'rejected data analysis', and showed that its security - in the limit of infinitely long keys - is almost independent of any encoding flaw in the qubit space, being this protocol compatible with the decoy state method. Here, as a step towards practical QKD, we show that a similar conclusion is reached in the finite-key regime, even when the intensity of the light source is unstable. More concretely, we derive security bounds for a wide class of realistic light sources and show that the bounds are also efficient in the presence of high channel loss. Our results strongly suggest the feasibility of long distance provably secure communication with imperfect light sources. © 2015 IOP Publishing Ltd and Deutsche Physikalische Gesellschaft. | |
dc.publisher | Institute of Physics Publishing | |
dc.rights | Attribution 4.0 International | |
dc.rights.uri | http://creativecommons.org/licenses/by/4.0/ | |
dc.source | Unpaywall 20201031 | |
dc.subject | Light | |
dc.subject | Light sources | |
dc.subject | Network security | |
dc.subject | Quantum optics | |
dc.subject | Security systems | |
dc.subject | Channel loss | |
dc.subject | Decoy state | |
dc.subject | Security analysis | |
dc.subject | State preparation | |
dc.subject | Theory and practice | |
dc.subject | Quantum cryptography | |
dc.type | Article | |
dc.contributor.department | ELECTRICAL AND COMPUTER ENGINEERING | |
dc.description.doi | 10.1088/1367-2630/17/9/093011 | |
dc.description.sourcetitle | New Journal of Physics | |
dc.description.volume | 17 | |
dc.description.issue | 9 | |
dc.description.page | 93011 | |
dc.published.state | Published | |
Appears in Collections: | Staff Publications Elements |
Show simple item record
Files in This Item:
File | Description | Size | Format | Access Settings | Version | |
---|---|---|---|---|---|---|
10_1088_1367-2630_17_9_093011.pdf | 1.95 MB | Adobe PDF | OPEN | None | View/Download |
This item is licensed under a Creative Commons License