{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T16:04:40Z","timestamp":1776441880170,"version":"3.51.2"},"reference-count":44,"publisher":"MDPI AG","issue":"11","license":[{"start":{"date-parts":[[2023,11,17]],"date-time":"2023-11-17T00:00:00Z","timestamp":1700179200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Priority 2030 program at the National University of Science and Technology \u201cMISIS\u201d","award":["K1-2022-027"],"award-info":[{"award-number":["K1-2022-027"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Entropy"],"abstract":"<jats:p>The quantum key distribution (QKD) allows two remote users to share a common information-theoretic secure secret key. In order to guarantee the security of a practical QKD implementation, the physical system has to be fully characterized and all deviations from the ideal protocol due to various imperfections of realistic devices have to be taken into account in the security proof. In this work, we study the security of the efficient decoy-state BB84 QKD protocol in the presence of the source flaws, caused by imperfect intensity and polarization modulation. We investigate the non-Poissonian photon-number statistics due to coherent-state intensity fluctuations and the basis-dependence of the source due to non-ideal polarization state preparation. The analysis is supported by the experimental characterization of intensity and phase distributions.<\/jats:p>","DOI":"10.3390\/e25111556","type":"journal-article","created":{"date-parts":[[2023,11,17]],"date-time":"2023-11-17T09:10:38Z","timestamp":1700212238000},"page":"1556","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Security of the Decoy-State BB84 Protocol with Imperfect State Preparation"],"prefix":"10.3390","volume":"25","author":[{"given":"Aleksei","family":"Reutov","sequence":"first","affiliation":[{"name":"Laboratory of Quantum Information Technologies, National University of Science and Technology MISIS, Moscow 119049, Russia"}]},{"given":"Andrey","family":"Tayduganov","sequence":"additional","affiliation":[{"name":"Laboratory of Quantum Information Technologies, National University of Science and Technology MISIS, Moscow 119049, Russia"}]},{"given":"Vladimir","family":"Mayboroda","sequence":"additional","affiliation":[{"name":"Laboratory of Quantum Information Technologies, National University of Science and Technology MISIS, Moscow 119049, Russia"}]},{"given":"Oleg","family":"Fat\u2019yanov","sequence":"additional","affiliation":[{"name":"Laboratory of Quantum Information Technologies, National University of Science and Technology MISIS, Moscow 119049, Russia"}]}],"member":"1968","published-online":{"date-parts":[[2023,11,17]]},"reference":[{"key":"ref_1","unstructured":"Bennett, C.H., and Brassard, G. (1984, January 9\u201312). Quantum cryptography: Public-key distribution and coin tossing. Proceedings of the IEEE International Conference on Computers,  Systems, and Signal Processing, Bangalore, India."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Mayers, D. (1996, January 18\u201322). Quantum key distribution and string oblivious transfer in noisy channels. Proceedings of the Advances in Cryptology\u2014CRYPTO\u201996, Santa Barbara, CA, USA.","DOI":"10.1007\/3-540-68697-5_26"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"057902","DOI":"10.1103\/PhysRevLett.90.057902","article-title":"Secure Quantum Key Distribution with an Uncharacterized Source","volume":"90","author":"Koashi","year":"2003","journal-title":"Phys. Rev. Lett."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"2050","DOI":"10.1126\/science.283.5410.2050","article-title":"Unconditional Security of Quantum Key Distribution over Arbitrarily Long Distances","volume":"283","author":"Lo","year":"1999","journal-title":"Science"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"441","DOI":"10.1103\/PhysRevLett.85.441","article-title":"Simple proof of security of the BB84 quantum key distribution protocol","volume":"85","author":"Shor","year":"2000","journal-title":"Phys. Rev. Lett."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"045018","DOI":"10.1088\/1367-2630\/11\/4\/045018","article-title":"Simple security proof of quantum key distribution based on complementarity","volume":"11","author":"Koashi","year":"2009","journal-title":"New J. Phys."},{"key":"ref_7","first-page":"325","article-title":"Security of quantum key distribution with imperfect devices","volume":"4","author":"Gottesman","year":"2004","journal-title":"Quant. Inf. Comput."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"052314","DOI":"10.1103\/PhysRevA.90.052314","article-title":"Loss-tolerant quantum cryptography with imperfect sources","volume":"90","author":"Tamaki","year":"2014","journal-title":"Phys. Rev. A"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"032305","DOI":"10.1103\/PhysRevA.92.032305","article-title":"Experimental quantum key distribution with source flaws","volume":"92","author":"Xu","year":"2015","journal-title":"Phys. Rev. A"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"042308","DOI":"10.1103\/PhysRevA.93.042308","article-title":"Experimental measurement-device-independent quantum key distribution with imperfect sources","volume":"93","author":"Tang","year":"2016","journal-title":"Phys. Rev. A"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"093011","DOI":"10.1088\/1367-2630\/17\/9\/093011","article-title":"Finite-key security analysis of quantum key distribution with imperfect light sources","volume":"17","author":"Mizutani","year":"2015","journal-title":"New J. Phys."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1038\/s41534-018-0122-y","article-title":"Quantum key distribution with setting-choice-independently correlated light sources","volume":"5","author":"Mizutani","year":"2019","journal-title":"npj Quantum Inf."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1038\/s41534-019-0180-9","article-title":"Quantum key distribution with flawed and leaky sources","volume":"5","author":"Pereira","year":"2019","journal-title":"npj Quantum Inf."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"eaaz4487","DOI":"10.1126\/sciadv.aaz4487","article-title":"Quantum key distribution with correlated sources","volume":"6","author":"Pereira","year":"2020","journal-title":"Sci. Adv."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"012406","DOI":"10.1103\/PhysRevA.104.012406","article-title":"Finite-key analysis of loss-tolerant quantum key distribution based on random sampling theory","volume":"104","author":"Navarrete","year":"2021","journal-title":"Phys. Rev. A"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"023065","DOI":"10.1103\/PhysRevResearch.5.023065","article-title":"Modified BB84 quantum key distribution protocol robust to source imperfections","volume":"5","author":"Pereira","year":"2023","journal-title":"Phys. Rev. Res."},{"key":"ref_17","unstructured":"Curr\u00e1s-Lorenzo, G., Pereira, M., Kato, G., Curty, M., and Tamaki, K. (2023). A security framework for quantum key distribution implementations. arXiv."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"1330","DOI":"10.1103\/PhysRevLett.85.1330","article-title":"Limitations on Practical Quantum Cryptography","volume":"85","author":"Brassard","year":"2000","journal-title":"Phys. Rev. Lett."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"052304","DOI":"10.1103\/PhysRevA.61.052304","article-title":"Security against individual attacks for realistic quantum key distribution","volume":"61","year":"2000","journal-title":"Phys. Rev. A"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"057901","DOI":"10.1103\/PhysRevLett.91.057901","article-title":"Quantum Key Distribution with High Loss: Toward Global Secure Communication","volume":"91","author":"Hwang","year":"2003","journal-title":"Phys. Rev. Lett."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"230504","DOI":"10.1103\/PhysRevLett.94.230504","article-title":"Decoy State Quantum Key Distribution","volume":"94","author":"Lo","year":"2005","journal-title":"Phys. Rev. Lett."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"230503","DOI":"10.1103\/PhysRevLett.94.230503","article-title":"Beating the Photon-Number-Splitting Attack in Practical Quantum Cryptography","volume":"94","author":"Wang","year":"2005","journal-title":"Phys. Rev. Lett."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"012326","DOI":"10.1103\/PhysRevA.72.012326","article-title":"Practical decoy state for quantum key distribution","volume":"72","author":"Ma","year":"2005","journal-title":"Phys. Rev. A"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"88","DOI":"10.3367\/UFNe.2020.11.038882","article-title":"Security of the decoy state method for quantum key distribution","volume":"64","author":"Trushechkin","year":"2021","journal-title":"Physics-Uspekhi"},{"key":"ref_25","first-page":"031030","article-title":"Practical Security Bounds Against the Trojan-Horse Attack in Quantum Key Distribution","volume":"5","author":"Lucamarini","year":"2015","journal-title":"Phys. Rev. X"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"065008","DOI":"10.1088\/1367-2630\/18\/6\/065008","article-title":"Decoy-state quantum key distribution with a leaky source","volume":"18","author":"Tamaki","year":"2016","journal-title":"New. J. Phys."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"083027","DOI":"10.1088\/1367-2630\/aad839","article-title":"Finite-key security analysis for quantum key distribution with leaky sources","volume":"20","author":"Wang","year":"2018","journal-title":"New. J. Phys."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"809","DOI":"10.1134\/S1063776120050064","article-title":"Trojan horse attacks, decoy state method, and side channels of information leakage in quantum cryptography","volume":"130","author":"Molotkov","year":"2020","journal-title":"J. Exp. Theor. Phys."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"272","DOI":"10.1134\/S1063776121080136","article-title":"Side channels of information leakage in quantum cryptography: Nonstrictly single-photon states, different quantum efficiencies of detectors, and finite transmitted sequences","volume":"133","author":"Molotkov","year":"2021","journal-title":"J. Exp. Theor. Phys."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"042311","DOI":"10.1103\/PhysRevA.77.042311","article-title":"General theory of decoy-state quantum cryptography with source errors","volume":"77","author":"Wang","year":"2008","journal-title":"Phys. Rev. A"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"075006","DOI":"10.1088\/1367-2630\/11\/7\/075006","article-title":"Decoy-state quantum key distribution with both source errors and statistical fluctuations","volume":"11","author":"Wang","year":"2009","journal-title":"New. J. Phys."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"012603","DOI":"10.1103\/PhysRevA.105.012603","article-title":"Security bounds for decoy-state quantum key distribution with arbitrary photon-number statistics","volume":"105","author":"Foletto","year":"2022","journal-title":"Phys. Rev. A"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"220801","DOI":"10.1103\/PhysRevLett.130.220801","article-title":"Fully Passive Quantum Key Distribution","volume":"130","author":"Wang","year":"2023","journal-title":"Phys. Rev. Lett."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1007\/s00145-004-0142-y","article-title":"Efficient Quantum Key Distribution Scheme and a Proof of Its Unconditional Security","volume":"18","author":"Lo","year":"2005","journal-title":"J. Cryptol."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"014048","DOI":"10.1103\/PhysRevApplied.19.014048","article-title":"Characterization of State-Preparation Uncertainty in Quantum Key Distribution","volume":"19","author":"Huang","year":"2023","journal-title":"Phys. Rev. Appl."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"012330","DOI":"10.1103\/PhysRevA.98.012330","article-title":"Quantum key distribution with distinguishable decoy states","volume":"98","author":"Huang","year":"2018","journal-title":"Phys. Rev. A"},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"28886","DOI":"10.1364\/OE.25.028886","article-title":"Low loss QKD optical scheme for fast polarization encoding","volume":"25","author":"Duplinskiy","year":"2017","journal-title":"Opt. Express"},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"025014","DOI":"10.1088\/2058-9565\/acbc46","article-title":"A fully passive transmitter for decoy-state quantum key distribution","volume":"8","author":"Zapatero","year":"2023","journal-title":"Quantum Sci. Technol."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"167904","DOI":"10.1103\/PhysRevLett.90.167904","article-title":"Unconditionally Secure Key Distribution Based on Two Nonorthogonal States","volume":"90","author":"Tamaki","year":"2003","journal-title":"Phys. Rev. Lett."},{"key":"ref_40","first-page":"431","article-title":"Security of Quantum Key Distribution Using Weak Coherent States with Nonrandom Phases","volume":"7","author":"Lo","year":"2007","journal-title":"Quantum Info. Comput."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"2315","DOI":"10.1080\/09500349414552171","article-title":"Fidelity for Mixed Quantum States","volume":"41","author":"Jozsa","year":"1994","journal-title":"J. Mod. Opt."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"022316","DOI":"10.1103\/PhysRevA.96.022316","article-title":"Practical issues in decoy-state quantum key distribution based on the central limit theorem","volume":"96","author":"Trushechkin","year":"2017","journal-title":"Phys. Rev. A"},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"012333","DOI":"10.1103\/PhysRevA.95.012333","article-title":"Improved key-rate bounds for practical decoy-state quantum-key-distribution systems","volume":"95","author":"Zhang","year":"2017","journal-title":"Phys. Rev. A"},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"Borisov, N., Petrov, I., and Tayduganov, A. (2023). Asymmetric Adaptive LDPC-Based Information Reconciliation for Industrial Quantum Key Distribution. Entropy, 25.","DOI":"10.3390\/e25010031"}],"container-title":["Entropy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1099-4300\/25\/11\/1556\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T21:24:52Z","timestamp":1760131492000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1099-4300\/25\/11\/1556"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,17]]},"references-count":44,"journal-issue":{"issue":"11","published-online":{"date-parts":[[2023,11]]}},"alternative-id":["e25111556"],"URL":"https:\/\/doi.org\/10.3390\/e25111556","relation":{},"ISSN":["1099-4300"],"issn-type":[{"value":"1099-4300","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,11,17]]}}}