We consider the security of the Bennett-Brassard 1984 protocol for quantum key distribution, with arbitrary individual imperfections simultaneously in the source and detectors. We provide the secure key generation rate and show that three parameters must be bounded to ensure security; the basis dependence of the source, a detector-blinding parameter, and a detector leakage parameter. The system may otherwise be completely uncharacterized and contain large losses.
Security of quantum key distribution with arbitrary individual imperfections
Oystein Maroy,L. Lydersen,J. Skaar
Published 2009 in Physical Review A
ABSTRACT
PUBLICATION RECORD
- Publication year
2009
- Venue
Physical Review A
- Publication date
2009-03-20
- Fields of study
Physics
- Identifiers
- External record
- Source metadata
Semantic Scholar
CITATION MAP
EXTRACTION MAP
CLAIMS
- No claims are published for this paper.
CONCEPTS
- No concepts are published for this paper.
REFERENCES
- No references are available for this paper.
Showing 0-0 of 0 references · Page 1 of 1
CITED BY
Showing 1-50 of 50 citing papers · Page 1 of 1