Finite-key security analysis for quantum key distribution with leaky sources
Security proofs of quantum key distribution (QKD) typically assume that the devices of the legitimate users are perfectly shielded from the eavesdropper. This assumption is, however, very hard to meet in practice, and thus the security of current QKD implementations is not guaranteed. Here, we fill...
Main Authors: | Weilong Wang, Kiyoshi Tamaki, Marcos Curty |
---|---|
Format: | Article |
Language: | English |
Published: |
IOP Publishing
2018-01-01
|
Series: | New Journal of Physics |
Subjects: | |
Online Access: | https://doi.org/10.1088/1367-2630/aad839 |
Similar Items
-
Asymmetric twin-field quantum key distribution
by: Federico Grasselli, et al.
Published: (2019-01-01) -
Decoy-state quantum key distribution with a leaky source
by: Kiyoshi Tamaki, et al.
Published: (2016-01-01) -
Practical decoy-state method for twin-field quantum key distribution
by: Federico Grasselli, et al.
Published: (2019-01-01) -
High-Dimensional Quantum Key Distribution in Quantum Access Networks
by: Osama Elmabrok, et al.
Published: (2024-01-01) -
Finite-key effects in multipartite quantum key distribution protocols
by: Federico Grasselli, et al.
Published: (2018-01-01)