Security of the Decoy-State BB84 Protocol with Imperfect State Preparation
The quantum key distribution (QKD) allows two remote users to share a common information-theoretic secure secret key. In order to guarantee the security of a practical QKD implementation, the physical system has to be fully characterized and all deviations from the ideal protocol due to various impe...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2023-11-01
|
Series: | Entropy |
Subjects: | |
Online Access: | https://www.mdpi.com/1099-4300/25/11/1556 |
_version_ | 1797459395553001472 |
---|---|
author | Aleksei Reutov Andrey Tayduganov Vladimir Mayboroda Oleg Fat’yanov |
author_facet | Aleksei Reutov Andrey Tayduganov Vladimir Mayboroda Oleg Fat’yanov |
author_sort | Aleksei Reutov |
collection | DOAJ |
description | The quantum key distribution (QKD) allows two remote users to share a common information-theoretic secure secret key. In order to guarantee the security of a practical QKD implementation, the physical system has to be fully characterized and all deviations from the ideal protocol due to various imperfections of realistic devices have to be taken into account in the security proof. In this work, we study the security of the efficient decoy-state BB84 QKD protocol in the presence of the source flaws, caused by imperfect intensity and polarization modulation. We investigate the non-Poissonian photon-number statistics due to coherent-state intensity fluctuations and the basis-dependence of the source due to non-ideal polarization state preparation. The analysis is supported by the experimental characterization of intensity and phase distributions. |
first_indexed | 2024-03-09T16:50:44Z |
format | Article |
id | doaj.art-430107a0cad1486a8c3039f9170f80ed |
institution | Directory Open Access Journal |
issn | 1099-4300 |
language | English |
last_indexed | 2024-03-09T16:50:44Z |
publishDate | 2023-11-01 |
publisher | MDPI AG |
record_format | Article |
series | Entropy |
spelling | doaj.art-430107a0cad1486a8c3039f9170f80ed2023-11-24T14:41:07ZengMDPI AGEntropy1099-43002023-11-012511155610.3390/e25111556Security of the Decoy-State BB84 Protocol with Imperfect State PreparationAleksei Reutov0Andrey Tayduganov1Vladimir Mayboroda2Oleg Fat’yanov3Laboratory of Quantum Information Technologies, National University of Science and Technology MISIS, Moscow 119049, RussiaLaboratory of Quantum Information Technologies, National University of Science and Technology MISIS, Moscow 119049, RussiaLaboratory of Quantum Information Technologies, National University of Science and Technology MISIS, Moscow 119049, RussiaLaboratory of Quantum Information Technologies, National University of Science and Technology MISIS, Moscow 119049, RussiaThe quantum key distribution (QKD) allows two remote users to share a common information-theoretic secure secret key. In order to guarantee the security of a practical QKD implementation, the physical system has to be fully characterized and all deviations from the ideal protocol due to various imperfections of realistic devices have to be taken into account in the security proof. In this work, we study the security of the efficient decoy-state BB84 QKD protocol in the presence of the source flaws, caused by imperfect intensity and polarization modulation. We investigate the non-Poissonian photon-number statistics due to coherent-state intensity fluctuations and the basis-dependence of the source due to non-ideal polarization state preparation. The analysis is supported by the experimental characterization of intensity and phase distributions.https://www.mdpi.com/1099-4300/25/11/1556quantum communicationquantum key distributionBB84source flaw |
spellingShingle | Aleksei Reutov Andrey Tayduganov Vladimir Mayboroda Oleg Fat’yanov Security of the Decoy-State BB84 Protocol with Imperfect State Preparation Entropy quantum communication quantum key distribution BB84 source flaw |
title | Security of the Decoy-State BB84 Protocol with Imperfect State Preparation |
title_full | Security of the Decoy-State BB84 Protocol with Imperfect State Preparation |
title_fullStr | Security of the Decoy-State BB84 Protocol with Imperfect State Preparation |
title_full_unstemmed | Security of the Decoy-State BB84 Protocol with Imperfect State Preparation |
title_short | Security of the Decoy-State BB84 Protocol with Imperfect State Preparation |
title_sort | security of the decoy state bb84 protocol with imperfect state preparation |
topic | quantum communication quantum key distribution BB84 source flaw |
url | https://www.mdpi.com/1099-4300/25/11/1556 |
work_keys_str_mv | AT alekseireutov securityofthedecoystatebb84protocolwithimperfectstatepreparation AT andreytayduganov securityofthedecoystatebb84protocolwithimperfectstatepreparation AT vladimirmayboroda securityofthedecoystatebb84protocolwithimperfectstatepreparation AT olegfatyanov securityofthedecoystatebb84protocolwithimperfectstatepreparation |