1. Quantum key distribution with imperfectly isolated devices
- Author
-
Sixto, Xoel, Navarrete, Álvaro, Pereira, Margarida, Currás-Lorenzo, Guillermo, Tamaki, Kiyoshi, and Curty, Marcos
- Subjects
Quantum Physics - Abstract
Most security proofs of quantum key distribution (QKD) assume that there is no unwanted information leakage about the state preparation process. However, this assumption is impossible to guarantee in practice, as QKD systems can leak information to the channel due to device imperfections or the active action of an eavesdropper. Here, we solve this pressing issue by introducing a security proof in the presence of information leakage from all state preparation settings for arguably the most popular QKD scheme, namely the decoy-state BB84 protocol. The proof requires minimal experimental characterization, as only a single parameter related to the isolation of the source needs to be determined, thus providing a clear path for bridging the gap between theory and practice. Moreover, if information about the state of the side channels is available, this can be readily incorporated into the analysis to further improve the resulting performance., Comment: 18 pages, 10 figures
- Published
- 2024