Security of quantum key distribution with detection-efficiency mismatch in the multiphoton case

  title={Security of quantum key distribution with detection-efficiency mismatch in the multiphoton case},
  author={Anton Trushechkin},
  • A. Trushechkin
  • Published 16 April 2020
  • Computer Science, Mathematics
  • Quantum
Detection-efficiency mismatch is a common problem in practical quantum key distribution (QKD) systems. Current security proofs of QKD with detection-efficiency mismatch rely either on the assumption of the single-photon light source on the sender side or on the assumption of the single-photon input of the receiver side. These assumptions impose restrictions on the class of possible eavesdropping strategies. Here we present a rigorous security proof without these assumptions and, thus, solve… 
1 Citations

Figures from this paper

Quantum computing: A taxonomy, systematic review and future directions

A comprehensive review of QC literature is presented and a proposed taxonomy of QC is proposed to map various related studies to identify the research gaps and identify various open challenges and promising future directions for research and innovation in QC.



Security of quantum key distribution with detection-efficiency mismatch in the single-photon case: Tight bounds

A method based on the analytical minimization of the relative entropy of coherence, which can be used in other problems in quantum key distribution, is proposed and an adaptation of the decoy state method to proof the security in the case of weak coherent pulses on the source side is proposed.

Security proof of practical quantum key distribution with detection-efficiency mismatch

The method applies to a variety of coding mechanisms, including time-bin encoding, and also allows for general manipulations of the spatial-temporal modes by the adversary, which can close the long-standing question how to provide a valid, complete security proof of a QKD setup with characterized efficiency mismatch.

Security loophole in free-space quantum key distribution due to spatial-mode detector-efficiency mismatch

In free-space quantum key distribution (QKD), the sensitivity of the receiver's detector channels may depend differently on the spatial mode of incoming photons. Consequently, an attacker can control

Security of quantum key distribution with imperfect devices

This paper prove the security of the Bennett-Brassard (BB84) quantum key distribution protocol in the case where the source and detector are under the limited control of an adversary. This proof

Security of quantum key distribution with bit and basis dependent detector flaws

Wesuggest a powerful attack that can be used in systems with detector efficiency mismatch, even if the detector assignments are chosen randomly by Bob, in the presence of bit and basis dependent detector flaws.

Unambiguous state discrimination in quantum cryptography with weak coherent states

This work explores quantitatively the limits for secure QKD imposed by the use of linearly independent signal states in realistic implementations of quantum key distribution ~QKD! taking into account that the receiver can monitor, to some extent the photon-number statistics of the signals even with todays standard detection schemes.

Practical issues in quantum-key-distribution postprocessing

This result is applicable to the BB84 protocol with a single or entangled photon source and serves as a recipe that specifies what postprocessing operations are needed and what the security level is for certain lengths of the keys.

Beating the photon-number-splitting attack in practical quantum cryptography.

We propose an efficient method to verify the upper bound of the fraction of counts caused by multiphoton pulses in practical quantum key distribution using weak coherent light, given whatever type of

Error Estimation at the Information Reconciliation Stage of Quantum Key Distribution

This work considers different approaches to the quantum bit error rate (QBER) estimation at the information reconciliation stage of the post-processing procedure, and develops a novel syndrome-based QBER estimation algorithm for reconciliation schemes employing low-density parity-check codes.

Simple security proof of quantum key distribution based on complementarity

An approach to the unconditional security of quantum key distribution protocols based on a complementarity argument is presented and a secure key rate is derived for the Bennett–Brassard-1984 protocol with an arbitrary source characterized only by a single parameter representing the basis dependence.