Security of quantum key distribution with arbitrary individual imperfections
نویسندگان
چکیده
We consider the security of the Bennett-Brassard 1984 protocol for quantum key distribution, with arbitrary individual imperfections simultaneously in the source and detectors. We provide the secure key generation rate and show that three parameters must be bounded to ensure security; the basis dependence of the source, a detector-blinding parameter, and a detector leakage parameter. The system may otherwise be completely uncharacterized and contain large losses.
منابع مشابه
An Elementary Proof of Private Random Number Generation from Bell Inequalities
The field of device-independent quantum cryptography has seen enormous success in the past several years, including security proofs for key distribution and random number generation that account for arbitrary imperfections in the devices used. Full security proofs in the field so far are long and technically deep. In this paper we show that the concept of the mirror adversary can be used to sim...
متن کاملSecurity of Key Distribution and Complementarity in Quantum Mechanics
• Quantum key distribution (BB84 protocol) • The goal of security proof • A very short course of quantum mechanics • Proving the security of QKD via complementarity • Basic idea • Small imperfections • A prescription for proving the security • The security of the BB84 protocol • Merits in the complementarity approach
متن کاملSecurity of quantum key distribution with entangled photons against individual attacks
We investigate the security of quantum key distribution with entangled photons, focusing on the two-photon variation of the Bennett-Brassard 1984 ~BB84! protocol proposed in 1992 by Bennett, Brasard, and Mermin ~BBM92!. We present a proof of security which applies to realistic sources, and to untrustable sources which can be placed outside the labs of the two receivers. The proof is restricted ...
متن کاملSecurity of quantum key distribution with bit and basis dependent detector flaws
We consider the security of the Bennett-Brassard 1984 (BB84) protocol for Quantum Key Distribution (QKD), in the presence of bit and basis dependent detector flaws. We suggest a powerful attack that can be used in systems with detector efficiency mismatch, even if the detector assignments are chosen randomly by Bob. A security proof is provided, valid for any basis dependent, linear optical imp...
متن کاملNumerical approach for unstructured quantum key distribution
Quantum key distribution (QKD) allows for communication with security guaranteed by quantum theory. The main theoretical problem in QKD is to calculate the secret key rate for a given protocol. Analytical formulas are known for protocols with symmetries, since symmetry simplifies the analysis. However, experimental imperfections break symmetries, hence the effect of imperfections on key rates i...
متن کامل