SIAM Review
Signals & systems (2nd ed.)
A proof of the security of quantum key distribution (extended abstract)
STOC '00 Proceedings of the thirty-second annual ACM symposium on Theory of computing
Unconditional security in quantum cryptography
Journal of the ACM (JACM)
Global Optimization with Polynomials and the Problem of Moments
SIAM Journal on Optimization
Efficient Quantum Key Distribution Scheme and a Proof of Its Unconditional Security
Journal of Cryptology
Security of quantum key distribution with imperfect devices
Quantum Information & Computation
Time-shift attack in practical quantum cryptosystems
Quantum Information & Computation
Security of quantum key distribution using weak coherent states with nonrandom phases
Quantum Information & Computation
Universally composable privacy amplification against quantum adversaries
TCC'05 Proceedings of the Second international conference on Theory of Cryptography
Proof of security of quantum key distribution with two-way classical communications
IEEE Transactions on Information Theory
Finite-key analysis for quantum key distribution with decoy states
Quantum Information & Computation
Security of quantum key distribution with bit and basis dependent detector flaws
Quantum Information & Computation
The security of SARG04 protocol in plug and play QKD system with an untrusted source
Quantum Information & Computation
Key-leakage evaluation of authentication in quantum key distribution with finite resources
Quantum Information Processing
Security of high speed quantum key distribution with finite detector dead time
Quantum Information & Computation
Hi-index | 0.00 |
In theory, quantum key distribution (QKD) offers unconditional security based on the laws of physics. However, as demonstrated in recent quantum hacking theory and experimental papers, detection efficiency loophole can be fatal to the security of practical QKD systems. Here, we describe the physical origin of detection efficiency mismatch in various domains including spatial, spectral, and time domains and in various experimental set-ups. More importantly, we prove the unconditional security of QKD even with detection efficiency mismatch. We explicitly show how the key generation rate is characterized by the maximal detection efficiency ratio between the two detectors. Furthermore, we prove that by randomly switching the bit assignments of the detectors, the effect of detection efficiency mismatch can be completely eliminated.