# Security of quantum key distribution with arbitrary individual imperfections

@article{Maroy2010SecurityOQ, title={Security of quantum key distribution with arbitrary individual imperfections}, author={Oystein Maroy and Lars Lydersen and Johannes Skaar}, journal={Physical Review A}, year={2010}, volume={82}, pages={032337} }

We consider the security of the Bennett-Brassard 1984 protocol for quantum key distribution, with arbitrary individual imperfections simultaneously in the source and detectors. We provide the secure key generation rate and show that three parameters must be bounded to ensure security; the basis dependence of the source, a detector-blinding parameter, and a detector leakage parameter. The system may otherwise be completely uncharacterized and contain large losses.

## 48 Citations

### Picture-perfect Quantum Key Distribution

- Physics, Computer Science
- 2017

We provide a new way to bound the security of quantum key distribution using only two high-level, diagrammatic features of quantum processes: the compositional behavior of complementary measurements…

### Security of quantum key distribution with source and detection imperfections

- Computer Science
- 2021

This work derives a security analysis which takes both the source and detection imperfections into account, and presents an important step toward the practical security of QKD wit realistic devices.

### Secure quantum key distribution with realistic devices

- Computer Science, Physics
- 2020

This review gives both sides of the story, with the current best theory of quantum security, and an extensive survey of what makes quantum cryptosystem safe in practice.

### Full-field implementation of a perfect eavesdropper on a quantum cryptography system.

- Computer Science, MathematicsNature communications
- 2011

It is shown that non-idealities in physical implementations of QKD can be fully practically exploitable, and must be given increased scrutiny if quantum cryptography is to become highly secure.

### Experimental quantum key distribution with source flaws

- Computer Science
- 2014

An experiment is performed that for the first time shows secure QKKD with imperfect state preparations over long distances and achieves rigorous finite-key security bounds for decoy-state QKD against coherent attacks in the universally composable framework.

### Secure detection in quantum key distribution by real-time calibration of receiver

- Computer Science, Physics
- 2016

A method is presented for estimating the detection efficiency of the detector unit, and the corresponding secure key generation rate, which gives a secure rate for any detector with non-unity single-photon detection efficiency.

### Measurement-Device-Independent Quantum Cryptography

- Computer ScienceIEEE Journal of Selected Topics in Quantum Electronics
- 2015

A novel approach to quantum key distribution, called measurement-device-independent QKD (mdiQKD), has been proposed, which can remove all side-channels from the measurement unit, arguably the most vulnerable part in QKKD systems, thus offering a clear avenue toward secure QkD realisations.

### Practical security of quantum cryptography

- Computer Science, Mathematics
- 2011

A secure detection scheme is proposed, immune to the detector control attack and compatible with those security proofs for quantum cryptography in a very general setting, and if this scheme is implemented correctly, it offers provable security.

### Understanding complementarity-based security proofs of quantum key distribution with imperfect sources

- Computer Science
- 2017

It is argued that analyzing such systems and finding capable attack operations is difficult to achieve by analytic methods; instead, further numerical techniques for sampling the parameter space of source states and attack operations in a computationally efficient manner are developed.

### Quantum man-in-the-middle attack on the calibration process of quantum key distribution

- Computer ScienceScientific Reports
- 2018

This paper reveals the security risk of the calibration process of a passive-basis-choice BB84 QKD system by launching a quantum man-in-the-middle attack which intercepts all calibration signals and resends faked ones, and proposes a basis-dependent detector efficiency mismatch (BEM) based faked states attack on a single photon BB84QKD to stress the threat of BEM.

## References

SHOWING 1-10 OF 36 REFERENCES

### Quantum computation and quantum information

- PhysicsMathematical Structures in Computer Science
- 2007

This special issue of Mathematical Structures in Computer Science contains several contributions related to the modern field of Quantum Information and Quantum Computing. The first two papers deal…

### in Proceedings of IEEE International Conference on Computers

- Systems, and Signal Processing
- 1984

### e-print quant-ph/0609180

- e-print quant-ph/0609180

### New J. Phys

- New J. Phys
- 2009

### Quantum Inf

- Comput. 4, 325
- 2004

### New J

- Phys. 11, 045018
- 2009

### New Jornal of Physics 11

- 045018 (2009). M. Koashi, e-print quant-ph/0505108v1
- 2005

### Phys. Rev. Lett

- Phys. Rev. Lett
- 2005

### Eur. Phys. J. D

- Eur. Phys. J. D
- 2007