Security of the Decoy-State BB84 Protocol with Imperfect State Preparation

The quantum key distribution (QKD) allows two remote users to share a common information-theoretic secure secret key. In order to guarantee the security of a practical QKD implementation, the physical system has to be fully characterized and all deviations from the ideal protocol due to various impe...

Full description

Bibliographic Details
Main Authors: Aleksei Reutov, Andrey Tayduganov, Vladimir Mayboroda, Oleg Fat’yanov
Format: Article
Language:English
Published: MDPI AG 2023-11-01
Series:Entropy
Subjects:
Online Access:https://www.mdpi.com/1099-4300/25/11/1556
_version_ 1797459395553001472
author Aleksei Reutov
Andrey Tayduganov
Vladimir Mayboroda
Oleg Fat’yanov
author_facet Aleksei Reutov
Andrey Tayduganov
Vladimir Mayboroda
Oleg Fat’yanov
author_sort Aleksei Reutov
collection DOAJ
description The quantum key distribution (QKD) allows two remote users to share a common information-theoretic secure secret key. In order to guarantee the security of a practical QKD implementation, the physical system has to be fully characterized and all deviations from the ideal protocol due to various imperfections of realistic devices have to be taken into account in the security proof. In this work, we study the security of the efficient decoy-state BB84 QKD protocol in the presence of the source flaws, caused by imperfect intensity and polarization modulation. We investigate the non-Poissonian photon-number statistics due to coherent-state intensity fluctuations and the basis-dependence of the source due to non-ideal polarization state preparation. The analysis is supported by the experimental characterization of intensity and phase distributions.
first_indexed 2024-03-09T16:50:44Z
format Article
id doaj.art-430107a0cad1486a8c3039f9170f80ed
institution Directory Open Access Journal
issn 1099-4300
language English
last_indexed 2024-03-09T16:50:44Z
publishDate 2023-11-01
publisher MDPI AG
record_format Article
series Entropy
spelling doaj.art-430107a0cad1486a8c3039f9170f80ed2023-11-24T14:41:07ZengMDPI AGEntropy1099-43002023-11-012511155610.3390/e25111556Security of the Decoy-State BB84 Protocol with Imperfect State PreparationAleksei Reutov0Andrey Tayduganov1Vladimir Mayboroda2Oleg Fat’yanov3Laboratory of Quantum Information Technologies, National University of Science and Technology MISIS, Moscow 119049, RussiaLaboratory of Quantum Information Technologies, National University of Science and Technology MISIS, Moscow 119049, RussiaLaboratory of Quantum Information Technologies, National University of Science and Technology MISIS, Moscow 119049, RussiaLaboratory of Quantum Information Technologies, National University of Science and Technology MISIS, Moscow 119049, RussiaThe quantum key distribution (QKD) allows two remote users to share a common information-theoretic secure secret key. In order to guarantee the security of a practical QKD implementation, the physical system has to be fully characterized and all deviations from the ideal protocol due to various imperfections of realistic devices have to be taken into account in the security proof. In this work, we study the security of the efficient decoy-state BB84 QKD protocol in the presence of the source flaws, caused by imperfect intensity and polarization modulation. We investigate the non-Poissonian photon-number statistics due to coherent-state intensity fluctuations and the basis-dependence of the source due to non-ideal polarization state preparation. The analysis is supported by the experimental characterization of intensity and phase distributions.https://www.mdpi.com/1099-4300/25/11/1556quantum communicationquantum key distributionBB84source flaw
spellingShingle Aleksei Reutov
Andrey Tayduganov
Vladimir Mayboroda
Oleg Fat’yanov
Security of the Decoy-State BB84 Protocol with Imperfect State Preparation
Entropy
quantum communication
quantum key distribution
BB84
source flaw
title Security of the Decoy-State BB84 Protocol with Imperfect State Preparation
title_full Security of the Decoy-State BB84 Protocol with Imperfect State Preparation
title_fullStr Security of the Decoy-State BB84 Protocol with Imperfect State Preparation
title_full_unstemmed Security of the Decoy-State BB84 Protocol with Imperfect State Preparation
title_short Security of the Decoy-State BB84 Protocol with Imperfect State Preparation
title_sort security of the decoy state bb84 protocol with imperfect state preparation
topic quantum communication
quantum key distribution
BB84
source flaw
url https://www.mdpi.com/1099-4300/25/11/1556
work_keys_str_mv AT alekseireutov securityofthedecoystatebb84protocolwithimperfectstatepreparation
AT andreytayduganov securityofthedecoystatebb84protocolwithimperfectstatepreparation
AT vladimirmayboroda securityofthedecoystatebb84protocolwithimperfectstatepreparation
AT olegfatyanov securityofthedecoystatebb84protocolwithimperfectstatepreparation