Security of quantum key distribution with detection-efficiency mismatch in the single-photon case: Tight bounds

MK Bochkov, AS Trushechkin - Physical Review A, 2019 - APS
One of the challenges in practical quantum key distribution is dealing with efficiency
mismatch between different threshold single-photon detectors. There are known bounds for …

Security of quantum key distribution with detection-efficiency mismatch in the multiphoton case

A Trushechkin - Quantum, 2022 - quantum-journal.org
Detection-efficiency mismatch is a common problem in practical quantum key distribution
(QKD) systems. Current security proofs of QKD with detection-efficiency mismatch rely either …

Security proof of practical quantum key distribution with detection-efficiency mismatch

Y Zhang, PJ Coles, A Winick, J Lin, N Lütkenhaus - Physical Review Research, 2021 - APS
Quantum key distribution (QKD) protocols with threshold detectors are driving high-
performance QKD demonstrations. The corresponding security proofs usually assume that …

Secure detection in quantum key distribution by real-time calibration of receiver

Ø Marøy, V Makarov, J Skaar - Quantum Science and …, 2017 - iopscience.iop.org
The single-photon detectionefficiency of the detector unit is crucial for the security of
common quantum key distribution protocols like Bennett-Brassard 1984 (BB84). A low value …

Security of quantum key distribution using weak coherent states with nonrandom phases

HK Lo, J Preskill - arXiv preprint quant-ph/0610203, 2006 - arxiv.org
We prove the security of the Bennett-Brassard (BB84) quantum key distribution protocol in
the case where the key information is encoded in the relative phase of a coherent-state …

Quantum key distribution with realistic states: photon-number statistics in the photon-number splitting attack

N Lütkenhaus, M Jahma - New Journal of Physics, 2002 - iopscience.iop.org
Quantum key distribution can be performed with practical signal sources such as weak
coherent pulses. One example of such a scheme is the Bennett-Brassard protocol that can …

Effect of finite detector efficiencies on the security evaluation of quantum key distribution

M Curty, N Lütkenhaus - Physical Review A—Atomic, Molecular, and Optical …, 2004 - APS
Quantum key distribution with the Bennett-Brassard 1984 protocol has been shown to be
unconditionally secure even using weak coherent pulses instead of single-photon signals …

Unconditional security of practical quantum key distribution

H Inamori, N Lütkenhaus, D Mayers - The European Physical Journal D, 2007 - Springer
We present a complete protocol for BB84 quantum key distribution for a realistic setting
(noise, loss, multi-photon signals of the source) that covers many of todays experimental …

Beating the photon-number-splitting attack in practical quantum cryptography

XB Wang - Physical review letters, 2005 - APS
We propose an efficient method to verify the upper bound of the fraction of counts caused by
multiphoton pulses in practical quantum key distribution using weak coherent light, given …

Enhancing practical security of quantum key distribution with a few decoy states

JW Harrington, JM Ettinger, RJ Hughes… - arXiv preprint quant-ph …, 2005 - arxiv.org
Quantum key distribution establishes a secret string of bits between two distant parties. Of
concern in weak laser pulse schemes is the especially strong photon number splitting attack …