期刊
NEW JOURNAL OF PHYSICS
卷 23, 期 2, 页码 -出版社
IOP Publishing Ltd
DOI: 10.1088/1367-2630/abdf9b
关键词
quantum key distribution; quantum cryptography; practical security; quantum information processing; quantum communication
资金
- National Natural Science Foundation of China (NSFC) [11674397]
This study provides a comprehensive security analysis considering both source and detection imperfections, evaluating the performance of a QKD system with imperfections. It represents an important step toward practical security of QKD with realistic devices.
In practice, the device imperfections might introduce deviations from the idealized models used in the security proofs of quantum key distribution (QKD). This requires the refined security analysis for practical QKD. However, in most of previous analysis, the imperfections are individually considered with different models. Here, we derive a security analysis which takes both the source and detection imperfections into account. Particularly, the efficiency mismatch in the detection and a number of flaws in the source (such as, inaccuracy of encoded quantum state, side-channel of source, distinguishable decoy states, Trojan-horse, and so on) are analyzed in a general security model. Then the performance of the QKD system with the devices imperfections is evaluated. Our results present an important step toward the practical security of QKD wit realistic devices.
作者
我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。
推荐
暂无数据