TY - JOUR
T1 - Quantum key distribution with correlated sources
AU - Pereira, Margarida
AU - Kato, Go
AU - Mizutani, Akihiro
AU - Curty, Marcos
AU - Tamaki, Kiyoshi
N1 - Publisher Copyright:
Copyright © 2020 The Authors, some rights reserved.
PY - 2020/9
Y1 - 2020/9
N2 - In theory, quantum key distribution (QKD) offers information-theoretic security. In practice, however, it does not due to the discrepancies between the assumptions used in the security proofs and the behavior of the real apparatuses. Recent years have witnessed a tremendous effort to fill the gap, but the treatment of correlations among pulses has remained a major elusive problem. Here, we close this gap by introducing a simple yet general method to prove the security of QKD with arbitrarily long-range pulse correlations. Our method is compatible with those security proofs that accommodate all the other typical device imperfections, thus paving the way toward achieving implementation security in QKD with arbitrary flawed devices. Moreover, we introduce a new framework for security proofs, which we call the reference technique. This framework includes existing security proofs as special cases, and it can be widely applied to a number of QKD protocols.
AB - In theory, quantum key distribution (QKD) offers information-theoretic security. In practice, however, it does not due to the discrepancies between the assumptions used in the security proofs and the behavior of the real apparatuses. Recent years have witnessed a tremendous effort to fill the gap, but the treatment of correlations among pulses has remained a major elusive problem. Here, we close this gap by introducing a simple yet general method to prove the security of QKD with arbitrarily long-range pulse correlations. Our method is compatible with those security proofs that accommodate all the other typical device imperfections, thus paving the way toward achieving implementation security in QKD with arbitrary flawed devices. Moreover, we introduce a new framework for security proofs, which we call the reference technique. This framework includes existing security proofs as special cases, and it can be widely applied to a number of QKD protocols.
UR - http://www.scopus.com/inward/record.url?scp=85090880192&partnerID=8YFLogxK
U2 - 10.1126/sciadv.aaz4487
DO - 10.1126/sciadv.aaz4487
M3 - 学術論文
C2 - 32917693
AN - SCOPUS:85090880192
SN - 2375-2548
VL - 6
JO - Science Advances
JF - Science Advances
IS - 37
M1 - eaaz4487
ER -