File Download
  Links for fulltext
     (May Require Subscription)
Supplementary

Article: Quantum key distribution with setting-choice-independently correlated light sources

TitleQuantum key distribution with setting-choice-independently correlated light sources
Authors
Issue Date2019
Citation
npj Quantum Information, 2019, v. 5, n. 1, article no. 8 How to Cite?
Abstract© 2019, The Author(s). Despite the enormous theoretical and experimental progress made so far in quantum key distribution (QKD), the security of most existing practical QKD systems is not rigorously established yet. A critical obstacle is that almost all existing security proofs make ideal assumptions on the QKD devices. Problematically, such assumptions are hard to satisfy in the experiments, and therefore it is not obvious how to apply such security proofs to practical QKD systems. Fortunately, any imperfections and security-loopholes in the measurement devices can be perfectly closed by measurement-device-independent QKD (MDI-QKD), and thus we only need to consider how to secure the source devices. Among imperfections in the source devices, correlations between the sending pulses and modulation fluctuations are one of the principal problems, which unfortunately most of the existing security proofs do not consider. In this paper, we take into account these imperfections and enhance the implementation security of QKD. Specifically, we consider a setting-choice-independent correlation (SCIC) framework in which the sending pulses can present arbitrary correlations but they are independent of the previous setting choices such as the bit, the basis and the intensity settings. Within the framework of SCIC, we consider the dominant fluctuations of the sending states, such as the relative phases and the intensities, and provide a self-contained information-theoretic security proof for the loss-tolerant QKD protocol in the finite-key regime. We demonstrate the feasibility of secure quantum communication, and thus our work constitutes a crucial step towards guaranteeing the security of practical QKD systems.
Persistent Identifierhttp://hdl.handle.net/10722/285535
ISI Accession Number ID

 

DC FieldValueLanguage
dc.contributor.authorMizutani, Akihiro-
dc.contributor.authorKato, Go-
dc.contributor.authorAzuma, Koji-
dc.contributor.authorCurty, Marcos-
dc.contributor.authorIkuta, Rikizo-
dc.contributor.authorYamamoto, Takashi-
dc.contributor.authorImoto, Nobuyuki-
dc.contributor.authorLo, Hoi Kwong-
dc.contributor.authorTamaki, Kiyoshi-
dc.date.accessioned2020-08-18T04:55:59Z-
dc.date.available2020-08-18T04:55:59Z-
dc.date.issued2019-
dc.identifier.citationnpj Quantum Information, 2019, v. 5, n. 1, article no. 8-
dc.identifier.urihttp://hdl.handle.net/10722/285535-
dc.description.abstract© 2019, The Author(s). Despite the enormous theoretical and experimental progress made so far in quantum key distribution (QKD), the security of most existing practical QKD systems is not rigorously established yet. A critical obstacle is that almost all existing security proofs make ideal assumptions on the QKD devices. Problematically, such assumptions are hard to satisfy in the experiments, and therefore it is not obvious how to apply such security proofs to practical QKD systems. Fortunately, any imperfections and security-loopholes in the measurement devices can be perfectly closed by measurement-device-independent QKD (MDI-QKD), and thus we only need to consider how to secure the source devices. Among imperfections in the source devices, correlations between the sending pulses and modulation fluctuations are one of the principal problems, which unfortunately most of the existing security proofs do not consider. In this paper, we take into account these imperfections and enhance the implementation security of QKD. Specifically, we consider a setting-choice-independent correlation (SCIC) framework in which the sending pulses can present arbitrary correlations but they are independent of the previous setting choices such as the bit, the basis and the intensity settings. Within the framework of SCIC, we consider the dominant fluctuations of the sending states, such as the relative phases and the intensities, and provide a self-contained information-theoretic security proof for the loss-tolerant QKD protocol in the finite-key regime. We demonstrate the feasibility of secure quantum communication, and thus our work constitutes a crucial step towards guaranteeing the security of practical QKD systems.-
dc.languageeng-
dc.relation.ispartofnpj Quantum Information-
dc.rightsThis work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.-
dc.titleQuantum key distribution with setting-choice-independently correlated light sources-
dc.typeArticle-
dc.description.naturepublished_or_final_version-
dc.identifier.doi10.1038/s41534-018-0122-y-
dc.identifier.scopuseid_2-s2.0-85069671331-
dc.identifier.volume5-
dc.identifier.issue1-
dc.identifier.spagearticle no. 8-
dc.identifier.epagearticle no. 8-
dc.identifier.eissn2056-6387-
dc.identifier.isiWOS:000456993700001-
dc.identifier.issnl2056-6387-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats