Finite-key security analysis for quantum key distribution with leaky sources

Security proofs of quantum key distribution (QKD) typically assume that the devices of the legitimate users are perfectly shielded from the eavesdropper. This assumption is, however, very hard to meet in practice, and thus the security of current QKD implementations is not guaranteed. Here, we fill...

Full description

Bibliographic Details
Main Authors: Weilong Wang, Kiyoshi Tamaki, Marcos Curty
Format: Article
Language:English
Published: IOP Publishing 2018-01-01
Series:New Journal of Physics
Subjects:
Online Access:https://doi.org/10.1088/1367-2630/aad839