# Security of quantum key distribution with detection-efficiency mismatch in the multiphoton case

@article{Trushechkin2022SecurityOQ, title={Security of quantum key distribution with detection-efficiency mismatch in the multiphoton case}, author={Anton Trushechkin}, journal={Quantum}, year={2022}, volume={6}, pages={771} }

Detection-efficiency mismatch is a common problem in practical quantum key distribution (QKD) systems. Current security proofs of QKD with detection-efficiency mismatch rely either on the assumption of the single-photon light source on the sender side or on the assumption of the single-photon input of the receiver side. These assumptions impose restrictions on the class of possible eavesdropping strategies. Here we present a rigorous security proof without these assumptions and, thus, solve…

## One Citation

### Quantum computing: A taxonomy, systematic review and future directions

- Computer ScienceSoftw. Pract. Exp.
- 2022

A comprehensive review of QC literature is presented and a proposed taxonomy of QC is proposed to map various related studies to identify the research gaps and identify various open challenges and promising future directions for research and innovation in QC.

## References

SHOWING 1-10 OF 72 REFERENCES

### Security of quantum key distribution with detection-efficiency mismatch in the single-photon case: Tight bounds

- Computer SciencePhysical Review A
- 2019

A method based on the analytical minimization of the relative entropy of coherence, which can be used in other problems in quantum key distribution, is proposed and an adaptation of the decoy state method to proof the security in the case of weak coherent pulses on the source side is proposed.

### Security proof of practical quantum key distribution with detection-efficiency mismatch

- Computer Science
- 2020

The method applies to a variety of coding mechanisms, including time-bin encoding, and also allows for general manipulations of the spatial-temporal modes by the adversary, which can close the long-standing question how to provide a valid, complete security proof of a QKD setup with characterized efficiency mismatch.

### Security loophole in free-space quantum key distribution due to spatial-mode detector-efficiency mismatch

- Physics
- 2015

In free-space quantum key distribution (QKD), the sensitivity of the receiver's detector channels may depend differently on the spatial mode of incoming photons. Consequently, an attacker can control…

### Security of quantum key distribution with imperfect devices

- Computer ScienceInternational Symposium onInformation Theory, 2004. ISIT 2004. Proceedings.
- 2004

This paper prove the security of the Bennett-Brassard (BB84) quantum key distribution protocol in the case where the source and detector are under the limited control of an adversary. This proof…

### Security of quantum key distribution with bit and basis dependent detector flaws

- Computer ScienceQuantum Inf. Comput.
- 2010

Wesuggest a powerful attack that can be used in systems with detector efficiency mismatch, even if the detector assignments are chosen randomly by Bob, in the presence of bit and basis dependent detector flaws.

### Unambiguous state discrimination in quantum cryptography with weak coherent states

- Computer Science
- 2000

This work explores quantitatively the limits for secure QKD imposed by the use of linearly independent signal states in realistic implementations of quantum key distribution ~QKD! taking into account that the receiver can monitor, to some extent the photon-number statistics of the signals even with todays standard detection schemes.

### Practical issues in quantum-key-distribution postprocessing

- Computer Science
- 2010

This result is applicable to the BB84 protocol with a single or entangled photon source and serves as a recipe that specifies what postprocessing operations are needed and what the security level is for certain lengths of the keys.

### Beating the photon-number-splitting attack in practical quantum cryptography.

- Physics, Computer SciencePhysical review letters
- 2005

We propose an efficient method to verify the upper bound of the fraction of counts caused by multiphoton pulses in practical quantum key distribution using weak coherent light, given whatever type of…

### Error Estimation at the Information Reconciliation Stage of Quantum Key Distribution

- Computer ScienceJournal of Russian Laser Research
- 2018

This work considers different approaches to the quantum bit error rate (QBER) estimation at the information reconciliation stage of the post-processing procedure, and develops a novel syndrome-based QBER estimation algorithm for reconciliation schemes employing low-density parity-check codes.

### Simple security proof of quantum key distribution based on complementarity

- Computer Science
- 2009

An approach to the unconditional security of quantum key distribution protocols based on a complementarity argument is presented and a secure key rate is derived for the Bennett–Brassard-1984 protocol with an arbitrary source characterized only by a single parameter representing the basis dependence.