Quantum key distribution with correlated sources

Margarida Pereira*, Go Kato, Akihiro Mizutani, Marcos Curty, Kiyoshi Tamaki*

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

59 Scopus citations

Abstract

In theory, quantum key distribution (QKD) offers information-theoretic security. In practice, however, it does not due to the discrepancies between the assumptions used in the security proofs and the behavior of the real apparatuses. Recent years have witnessed a tremendous effort to fill the gap, but the treatment of correlations among pulses has remained a major elusive problem. Here, we close this gap by introducing a simple yet general method to prove the security of QKD with arbitrarily long-range pulse correlations. Our method is compatible with those security proofs that accommodate all the other typical device imperfections, thus paving the way toward achieving implementation security in QKD with arbitrary flawed devices. Moreover, we introduce a new framework for security proofs, which we call the reference technique. This framework includes existing security proofs as special cases, and it can be widely applied to a number of QKD protocols.

Original languageEnglish
Article numbereaaz4487
JournalScience Advances
Volume6
Issue number37
DOIs
StatePublished - 2020/09

ASJC Scopus subject areas

  • General

Fingerprint

Dive into the research topics of 'Quantum key distribution with correlated sources'. Together they form a unique fingerprint.

Cite this