Abstract
An eavesdropper may gain information by exploiting device imperfections while implementing quantum key distribution protocols. We find information leakage due to coupling mismatch at receiver’s detectors in terms of mutual information between eaves-dropper and receiver.
© 2022 The Author(s)
PDF Article | Presentation VideoMore Like This
N. Jain, L. Lydersen, C. Wittmann, C. Wiechers, D. Elser, Ch. Marquardt, V. Makarov, and G. Leuchs
CI3_4 The European Conference on Lasers and Electro-Optics (CLEO/Europe) 2011
Y. Zhang and N. Lütkenhaus
FTu1C.3 CLEO: QELS_Fundamental Science (CLEO:FS) 2016
Boris A. Slutsky, R. Rao, L. Tancevski, P. C. Sun, and Y. Fainman
OWC.2 Optics in Computing (IP) 1997