no code implementations • 9 Apr 2020 • Yanbao Zhang, Patrick J. Coles, Adam Winick, Jie Lin, Norbert Lutkenhaus
Our method also shows that in the absence of efficiency mismatch in our detector model, the key rate increases if the loss due to detection inefficiency is assumed to be outside of the adversary's control, as compared to the view where for a security proof this loss is attributed to the action of the adversary.
Quantum Physics