TY - JOUR
T1 - Experimental quantum key distribution with source flaws
AU - Xu, Feihu
AU - Wei, Kejin
AU - Sajeed, Shihan
AU - Kaiser, Sarah
AU - Sun, Shihai
AU - Tang, Zhiyuan
AU - Qian, Li
AU - Makarov, Vadim
AU - Lo, Hoi Kwong
PY - 2015/9/4
Y1 - 2015/9/4
N2 - Decoy-state quantum key distribution (QKD) is a standard technique in current quantum cryptographic implementations. Unfortunately, existing experiments have two important drawbacks: the state preparation is assumed to be perfect without errors and the employed security proofs do not fully consider the finite-key effects for general attacks. These two drawbacks mean that existing experiments are not guaranteed to be proven to be secure in practice. Here, we perform an experiment that shows secure QKD with imperfect state preparations over long distances and achieves rigorous finite-key security bounds for decoy-state QKD against coherent attacks in the universally composable framework. We quantify the source flaws experimentally and demonstrate a QKD implementation that is tolerant to channel loss despite the source flaws. Our implementation considers more real-world problems than most previous experiments, and our theory can be applied to general discrete-variable QKD systems. These features constitute a step towards secure QKD with imperfect devices.
AB - Decoy-state quantum key distribution (QKD) is a standard technique in current quantum cryptographic implementations. Unfortunately, existing experiments have two important drawbacks: the state preparation is assumed to be perfect without errors and the employed security proofs do not fully consider the finite-key effects for general attacks. These two drawbacks mean that existing experiments are not guaranteed to be proven to be secure in practice. Here, we perform an experiment that shows secure QKD with imperfect state preparations over long distances and achieves rigorous finite-key security bounds for decoy-state QKD against coherent attacks in the universally composable framework. We quantify the source flaws experimentally and demonstrate a QKD implementation that is tolerant to channel loss despite the source flaws. Our implementation considers more real-world problems than most previous experiments, and our theory can be applied to general discrete-variable QKD systems. These features constitute a step towards secure QKD with imperfect devices.
UR - http://www.scopus.com/inward/record.url?scp=84941892189&partnerID=8YFLogxK
U2 - 10.1103/PhysRevA.92.032305
DO - 10.1103/PhysRevA.92.032305
M3 - Article
AN - SCOPUS:84941892189
SN - 1050-2947
VL - 92
SP - 1
EP - 11
JO - Physical Review A - Atomic, Molecular, and Optical Physics
JF - Physical Review A - Atomic, Molecular, and Optical Physics
IS - 3
M1 - 032305
ER -