Security of quantum key distribution with arbitrary individual imperfections

Øystein Marøy, Lars Lydersen, and Johannes Skaar
Phys. Rev. A 82, 032337 – Published 30 September 2010

Abstract

We consider the security of the Bennett-Brassard 1984 protocol for quantum key distribution, with arbitrary individual imperfections simultaneously in the source and detectors. We provide the secure key generation rate and show that three parameters must be bounded to ensure security; the basis dependence of the source, a detector-blinding parameter, and a detector leakage parameter. The system may otherwise be completely uncharacterized and contain large losses.

  • Figure
  • Figure
  • Figure
  • Received 23 March 2009

DOI:https://doi.org/10.1103/PhysRevA.82.032337

©2010 American Physical Society

Authors & Affiliations

Øystein Marøy*, Lars Lydersen, and Johannes Skaar

  • Department of Electronics and Telecommunications, Norwegian University of Science and Technology, NO-7491 Trondheim, Norway and University Graduate Center, NO-2027 Kjeller, Norway

  • *oystein.maroy@iet.ntnu.no

Article Text (Subscription Required)

Click to Expand

References (Subscription Required)

Click to Expand
Issue

Vol. 82, Iss. 3 — September 2010

Reuse & Permissions
Access Options
Author publication services for translation and copyediting assistance advertisement

Authorization Required


×
×

Images

×

Sign up to receive regular email alerts from Physical Review A

Log In

Cancel
×

Search


Article Lookup

Paste a citation or DOI

Enter a citation
×