Please use this identifier to cite or link to this item: https://doi.org/10.1088/1367-2630/17/9/093011
DC FieldValue
dc.titleFinite-key security analysis of quantum key distribution with imperfect light sources
dc.contributor.authorMizutani, A
dc.contributor.authorCurty, M
dc.contributor.authorLim, C.C.W
dc.contributor.authorImoto, N
dc.contributor.authorTamaki, K
dc.date.accessioned2020-10-23T08:10:36Z
dc.date.available2020-10-23T08:10:36Z
dc.date.issued2015
dc.identifier.citationMizutani, A, Curty, M, Lim, C.C.W, Imoto, N, Tamaki, K (2015). Finite-key security analysis of quantum key distribution with imperfect light sources. New Journal of Physics 17 (9) : 93011. ScholarBank@NUS Repository. https://doi.org/10.1088/1367-2630/17/9/093011
dc.identifier.issn1367-2630
dc.identifier.urihttps://scholarbank.nus.edu.sg/handle/10635/179649
dc.description.abstractIn recent years, the gap between theory and practice in quantum key distribution (QKD) has been significantly narrowed, particularly for QKD systems with arbitrarily flawed optical receivers. The status for QKD systems with imperfect light sources is however less satisfactory, in the sense that the resulting secure key rates are often overly dependent on the quality of state preparation. This is especially the case when the channel loss is high. Very recently, to overcome this limitation, Tamaki et al proposed a QKD protocol based on the so-called 'rejected data analysis', and showed that its security - in the limit of infinitely long keys - is almost independent of any encoding flaw in the qubit space, being this protocol compatible with the decoy state method. Here, as a step towards practical QKD, we show that a similar conclusion is reached in the finite-key regime, even when the intensity of the light source is unstable. More concretely, we derive security bounds for a wide class of realistic light sources and show that the bounds are also efficient in the presence of high channel loss. Our results strongly suggest the feasibility of long distance provably secure communication with imperfect light sources. © 2015 IOP Publishing Ltd and Deutsche Physikalische Gesellschaft.
dc.publisherInstitute of Physics Publishing
dc.rightsAttribution 4.0 International
dc.rights.urihttp://creativecommons.org/licenses/by/4.0/
dc.sourceUnpaywall 20201031
dc.subjectLight
dc.subjectLight sources
dc.subjectNetwork security
dc.subjectQuantum optics
dc.subjectSecurity systems
dc.subjectChannel loss
dc.subjectDecoy state
dc.subjectSecurity analysis
dc.subjectState preparation
dc.subjectTheory and practice
dc.subjectQuantum cryptography
dc.typeArticle
dc.contributor.departmentELECTRICAL AND COMPUTER ENGINEERING
dc.description.doi10.1088/1367-2630/17/9/093011
dc.description.sourcetitleNew Journal of Physics
dc.description.volume17
dc.description.issue9
dc.description.page93011
dc.published.statePublished
Appears in Collections:Staff Publications
Elements

Show simple item record
Files in This Item:
File Description SizeFormatAccess SettingsVersion 
10_1088_1367-2630_17_9_093011.pdf1.95 MBAdobe PDF

OPEN

NoneView/Download

Google ScholarTM

Check

Altmetric


This item is licensed under a Creative Commons License Creative Commons