Next Article in Journal
Topological Dimensions from Disorder and Quantum Mechanics?
Next Article in Special Issue
Bosonic Representation of Matrices and Angular Momentum Probabilistic Representation of Cyclic States
Previous Article in Journal
Causal Factor Disentanglement for Few-Shot Domain Adaptation in Video Prediction
Previous Article in Special Issue
Quantum and Quantum-Inspired Stereographic K Nearest-Neighbour Clustering
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Security of the Decoy-State BB84 Protocol with Imperfect State Preparation

Laboratory of Quantum Information Technologies, National University of Science and Technology MISIS, Moscow 119049, Russia
*
Author to whom correspondence should be addressed.
Entropy 2023, 25(11), 1556; https://doi.org/10.3390/e25111556
Submission received: 6 October 2023 / Revised: 6 November 2023 / Accepted: 14 November 2023 / Published: 17 November 2023

Abstract

The quantum key distribution (QKD) allows two remote users to share a common information-theoretic secure secret key. In order to guarantee the security of a practical QKD implementation, the physical system has to be fully characterized and all deviations from the ideal protocol due to various imperfections of realistic devices have to be taken into account in the security proof. In this work, we study the security of the efficient decoy-state BB84 QKD protocol in the presence of the source flaws, caused by imperfect intensity and polarization modulation. We investigate the non-Poissonian photon-number statistics due to coherent-state intensity fluctuations and the basis-dependence of the source due to non-ideal polarization state preparation. The analysis is supported by the experimental characterization of intensity and phase distributions.
Keywords: quantum communication; quantum key distribution; BB84; source flaw quantum communication; quantum key distribution; BB84; source flaw

Share and Cite

MDPI and ACS Style

Reutov, A.; Tayduganov, A.; Mayboroda, V.; Fat’yanov, O. Security of the Decoy-State BB84 Protocol with Imperfect State Preparation. Entropy 2023, 25, 1556. https://doi.org/10.3390/e25111556

AMA Style

Reutov A, Tayduganov A, Mayboroda V, Fat’yanov O. Security of the Decoy-State BB84 Protocol with Imperfect State Preparation. Entropy. 2023; 25(11):1556. https://doi.org/10.3390/e25111556

Chicago/Turabian Style

Reutov, Aleksei, Andrey Tayduganov, Vladimir Mayboroda, and Oleg Fat’yanov. 2023. "Security of the Decoy-State BB84 Protocol with Imperfect State Preparation" Entropy 25, no. 11: 1556. https://doi.org/10.3390/e25111556

APA Style

Reutov, A., Tayduganov, A., Mayboroda, V., & Fat’yanov, O. (2023). Security of the Decoy-State BB84 Protocol with Imperfect State Preparation. Entropy, 25(11), 1556. https://doi.org/10.3390/e25111556

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop