Security of quantum key distribution with arbitrary individual imperfections

  title={Security of quantum key distribution with arbitrary individual imperfections},
  author={Oystein Maroy and Lars Lydersen and Johannes Skaar},
  journal={Physical Review A},
We consider the security of the Bennett-Brassard 1984 protocol for quantum key distribution, with arbitrary individual imperfections simultaneously in the source and detectors. We provide the secure key generation rate and show that three parameters must be bounded to ensure security; the basis dependence of the source, a detector-blinding parameter, and a detector leakage parameter. The system may otherwise be completely uncharacterized and contain large losses. 

Figures from this paper

Picture-perfect Quantum Key Distribution

We provide a new way to bound the security of quantum key distribution using only two high-level, diagrammatic features of quantum processes: the compositional behavior of complementary measurements

Security of quantum key distribution with source and detection imperfections

This work derives a security analysis which takes both the source and detection imperfections into account, and presents an important step toward the practical security of QKD wit realistic devices.

Secure quantum key distribution with realistic devices

This review gives both sides of the story, with the current best theory of quantum security, and an extensive survey of what makes quantum cryptosystem safe in practice.

Full-field implementation of a perfect eavesdropper on a quantum cryptography system.

It is shown that non-idealities in physical implementations of QKD can be fully practically exploitable, and must be given increased scrutiny if quantum cryptography is to become highly secure.

Experimental quantum key distribution with source flaws

An experiment is performed that for the first time shows secure QKKD with imperfect state preparations over long distances and achieves rigorous finite-key security bounds for decoy-state QKD against coherent attacks in the universally composable framework.

Secure detection in quantum key distribution by real-time calibration of receiver

A method is presented for estimating the detection efficiency of the detector unit, and the corresponding secure key generation rate, which gives a secure rate for any detector with non-unity single-photon detection efficiency.

Measurement-Device-Independent Quantum Cryptography

A novel approach to quantum key distribution, called measurement-device-independent QKD (mdiQKD), has been proposed, which can remove all side-channels from the measurement unit, arguably the most vulnerable part in QKKD systems, thus offering a clear avenue toward secure QkD realisations.

Practical security of quantum cryptography

A secure detection scheme is proposed, immune to the detector control attack and compatible with those security proofs for quantum cryptography in a very general setting, and if this scheme is implemented correctly, it offers provable security.

Understanding complementarity-based security proofs of quantum key distribution with imperfect sources

It is argued that analyzing such systems and finding capable attack operations is difficult to achieve by analytic methods; instead, further numerical techniques for sampling the parameter space of source states and attack operations in a computationally efficient manner are developed.

Quantum man-in-the-middle attack on the calibration process of quantum key distribution

This paper reveals the security risk of the calibration process of a passive-basis-choice BB84 QKD system by launching a quantum man-in-the-middle attack which intercepts all calibration signals and resends faked ones, and proposes a basis-dependent detector efficiency mismatch (BEM) based faked states attack on a single photon BB84QKD to stress the threat of BEM.



Quantum computation and quantum information

  • T. Paul
  • Physics
    Mathematical Structures in Computer Science
  • 2007
This special issue of Mathematical Structures in Computer Science contains several contributions related to the modern field of Quantum Information and Quantum Computing. The first two papers deal

in Proceedings of IEEE International Conference on Computers

  • Systems, and Signal Processing
  • 1984

e-print quant-ph/0609180

  • e-print quant-ph/0609180

New J. Phys

  • New J. Phys
  • 2009

Quantum Inf

  • Comput. 4, 325
  • 2004

New J

  • Phys. 11, 045018
  • 2009

New Jornal of Physics 11

  • 045018 (2009). M. Koashi, e-print quant-ph/0505108v1
  • 2005

Physical Review

  • Art
  • 1965

Phys. Rev. Lett

  • Phys. Rev. Lett
  • 2005

Eur. Phys. J. D

  • Eur. Phys. J. D
  • 2007