File Download
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1038/s41534-018-0122-y
- Scopus: eid_2-s2.0-85069671331
- WOS: WOS:000456993700001
Supplementary
- Citations:
- Appears in Collections:
Article: Quantum key distribution with setting-choice-independently correlated light sources
Title | Quantum key distribution with setting-choice-independently correlated light sources |
---|---|
Authors | |
Issue Date | 2019 |
Citation | npj Quantum Information, 2019, v. 5, n. 1, article no. 8 How to Cite? |
Abstract | © 2019, The Author(s). Despite the enormous theoretical and experimental progress made so far in quantum key distribution (QKD), the security of most existing practical QKD systems is not rigorously established yet. A critical obstacle is that almost all existing security proofs make ideal assumptions on the QKD devices. Problematically, such assumptions are hard to satisfy in the experiments, and therefore it is not obvious how to apply such security proofs to practical QKD systems. Fortunately, any imperfections and security-loopholes in the measurement devices can be perfectly closed by measurement-device-independent QKD (MDI-QKD), and thus we only need to consider how to secure the source devices. Among imperfections in the source devices, correlations between the sending pulses and modulation fluctuations are one of the principal problems, which unfortunately most of the existing security proofs do not consider. In this paper, we take into account these imperfections and enhance the implementation security of QKD. Specifically, we consider a setting-choice-independent correlation (SCIC) framework in which the sending pulses can present arbitrary correlations but they are independent of the previous setting choices such as the bit, the basis and the intensity settings. Within the framework of SCIC, we consider the dominant fluctuations of the sending states, such as the relative phases and the intensities, and provide a self-contained information-theoretic security proof for the loss-tolerant QKD protocol in the finite-key regime. We demonstrate the feasibility of secure quantum communication, and thus our work constitutes a crucial step towards guaranteeing the security of practical QKD systems. |
Persistent Identifier | http://hdl.handle.net/10722/285535 |
ISI Accession Number ID |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Mizutani, Akihiro | - |
dc.contributor.author | Kato, Go | - |
dc.contributor.author | Azuma, Koji | - |
dc.contributor.author | Curty, Marcos | - |
dc.contributor.author | Ikuta, Rikizo | - |
dc.contributor.author | Yamamoto, Takashi | - |
dc.contributor.author | Imoto, Nobuyuki | - |
dc.contributor.author | Lo, Hoi Kwong | - |
dc.contributor.author | Tamaki, Kiyoshi | - |
dc.date.accessioned | 2020-08-18T04:55:59Z | - |
dc.date.available | 2020-08-18T04:55:59Z | - |
dc.date.issued | 2019 | - |
dc.identifier.citation | npj Quantum Information, 2019, v. 5, n. 1, article no. 8 | - |
dc.identifier.uri | http://hdl.handle.net/10722/285535 | - |
dc.description.abstract | © 2019, The Author(s). Despite the enormous theoretical and experimental progress made so far in quantum key distribution (QKD), the security of most existing practical QKD systems is not rigorously established yet. A critical obstacle is that almost all existing security proofs make ideal assumptions on the QKD devices. Problematically, such assumptions are hard to satisfy in the experiments, and therefore it is not obvious how to apply such security proofs to practical QKD systems. Fortunately, any imperfections and security-loopholes in the measurement devices can be perfectly closed by measurement-device-independent QKD (MDI-QKD), and thus we only need to consider how to secure the source devices. Among imperfections in the source devices, correlations between the sending pulses and modulation fluctuations are one of the principal problems, which unfortunately most of the existing security proofs do not consider. In this paper, we take into account these imperfections and enhance the implementation security of QKD. Specifically, we consider a setting-choice-independent correlation (SCIC) framework in which the sending pulses can present arbitrary correlations but they are independent of the previous setting choices such as the bit, the basis and the intensity settings. Within the framework of SCIC, we consider the dominant fluctuations of the sending states, such as the relative phases and the intensities, and provide a self-contained information-theoretic security proof for the loss-tolerant QKD protocol in the finite-key regime. We demonstrate the feasibility of secure quantum communication, and thus our work constitutes a crucial step towards guaranteeing the security of practical QKD systems. | - |
dc.language | eng | - |
dc.relation.ispartof | npj Quantum Information | - |
dc.rights | This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License. | - |
dc.title | Quantum key distribution with setting-choice-independently correlated light sources | - |
dc.type | Article | - |
dc.description.nature | published_or_final_version | - |
dc.identifier.doi | 10.1038/s41534-018-0122-y | - |
dc.identifier.scopus | eid_2-s2.0-85069671331 | - |
dc.identifier.volume | 5 | - |
dc.identifier.issue | 1 | - |
dc.identifier.spage | article no. 8 | - |
dc.identifier.epage | article no. 8 | - |
dc.identifier.eissn | 2056-6387 | - |
dc.identifier.isi | WOS:000456993700001 | - |
dc.identifier.issnl | 2056-6387 | - |