Research ArticlePHYSICS

Quantum key distribution with correlated sources

See allHide authors and affiliations

Science Advances  09 Sep 2020:
Vol. 6, no. 37, eaaz4487
DOI: 10.1126/sciadv.aaz4487
  • Fig. 1 Secret key rate R against the overall system loss measured in dB in the presence of correlations between the emitted pulses when our method is applied to the RT based on the GLT (RT-GLT) protocol and to the RT based on the original LT (RT-LT) protocol.

    In all graphs, the blue and red lines are associated with the RT-GLT and the RT-LT, respectively. The solid lines correspond to the nearest-neighbor pulse correlations ϵ1, while the dashed (dashed-dotted) lines correspond to second ϵ2 (tenth ϵ10) neighbor pulse correlations, as indicated in the legend. (A) When there are no SPFs and the parameter ϵ is high, the RT-GLT and the RT-LT provide similar secret key rates. (B) As the parameter ϵ decreases, both security proofs provide higher secret key rates, but the RT-LT clearly outperforms the RT-GLT. (C) In the presence of SPFs, the secret key rate is only slightly worse for all cases since the security proofs are based on the LT protocol. (D) For high SPFs and low ϵ, the RT-LT is still superior to the RT-GLT.

Supplementary Materials

  • Supplementary Materials

    Quantum key distribution with correlated sources

    Margarida Pereira, Go Kato, Akihiro Mizutani, Marcos Curty, Kiyoshi Tamaki

    Download Supplement

    This PDF file includes:

    • Sections S1 to S3
    • Fig. S1

    Files in this Data Supplement:

Stay Connected to Science Advances

Navigate This Article