Experimental measurement-device-independent type quantum key distribution with flawed and correlated sources

被引:87
作者
Gu, Jie [1 ,2 ]
Cao, Xiao-Yu [1 ,2 ]
Fu, Yao [3 ,4 ,5 ]
He, Zong-Wu [1 ,2 ]
Yin, Ze-Jie [6 ]
Yin, Hua-Lei [1 ,2 ]
Chen, Zeng-Bing [1 ,2 ,5 ]
机构
[1] Nanjing Univ, Natl Lab Solid State Microstruct, Nanjing 210093, Peoples R China
[2] Nanjing Univ, Sch Phys, Collaborat Innovat Ctr Adv Microstruct, Nanjing 210093, Peoples R China
[3] Chinese Acad Sci, Beijing Natl Lab Condensed Matter Phys, Beijing 100190, Peoples R China
[4] Chinese Acad Sci, Inst Phys, Beijing 100190, Peoples R China
[5] MatricTime Digital Technol Co Ltd, Nanjing 211899, Peoples R China
[6] Univ Sci & Technol China, State Key Lab Particle Detect & Elect, Hefei 230026, Peoples R China
关键词
Measurement-device-independent; Quantum key distribution; Reference technique; Source flaw characterization; Practical security;
D O I
10.1016/j.scib.2022.10.010
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
The security of quantum key distribution (QKD) is severely threatened by discrepancies between realistic devices and theoretical assumptions. Recently, a significant framework called the reference technique was proposed to provide security against arbitrary source flaws under current technology such as state preparation flaws, side channels caused by mode dependencies, the Trojan horse attacks and pulse correlations. Here, we adopt the reference technique to prove security of an efficient four-phase measurement-device-independent QKD using laser pulses against potential source imperfections. We present a characterization of source flaws and connect them to experiments, together with a finite-key analysis against coherent attacks. In addition, we demonstrate the feasibility of our protocol through a proof-of-principle experimental implementation and achieve a secure key rate of 253 bps with a 20 dB channel loss. Compared with previous QKD protocols with imperfect devices, our study considerably improves both the secure key rate and the transmission distance, and shows application potential in the practical deployment of secure QKD with device imperfections. (c) 2022 Science China Press. Published by Elsevier B.V. and Science China Press.
引用
收藏
页码:2167 / 2175
页数:9
相关论文
共 69 条
[1]   Device-independent security of quantum cryptography against collective attacks [J].
Acin, Antonio ;
Brunner, Nicolas ;
Gisin, Nicolas ;
Massar, Serge ;
Pironio, Stefano ;
Scarani, Valerio .
PHYSICAL REVIEW LETTERS, 2007, 98 (23)
[2]   Quantum cryptography: Public key distribution and coin tossing [J].
Bennett, Charles H. ;
Brassard, Gilles .
THEORETICAL COMPUTER SCIENCE, 2014, 560 :7-11
[3]   Side-Channel-Free Quantum Key Distribution [J].
Braunstein, Samuel L. ;
Pirandola, Stefano .
PHYSICAL REVIEW LETTERS, 2012, 108 (13)
[4]  
Comandar LC, 2016, NAT PHOTONICS, V10, P312, DOI [10.1038/nphoton.2016.50, 10.1038/NPHOTON.2016.50]
[5]   Tight finite-key security for twin-field quantum key distribution [J].
Curras-Lorenzo, Guillermo ;
Navarrete, Alvaro ;
Azuma, Koji ;
Kato, Go ;
Curty, Marcos ;
Razavi, Mohsen .
NPJ QUANTUM INFORMATION, 2021, 7 (01)
[6]   Finite-key analysis for measurement-device-independent quantum key distribution [J].
Curty, Marcos ;
Xu, Feihu ;
Cui, Wei ;
Lim, Charles Ci Wen ;
Tamaki, Kiyoshi ;
Lo, Hoi-Kwong .
NATURE COMMUNICATIONS, 2014, 5
[7]   Measurement-device-independent quantum key distribution with insecure sources [J].
Ding, Hua-Jian ;
Zhou, Xing-Yu ;
Zhang, Chun-Hui ;
Li, Jian ;
Wang, Qin .
OPTICS LETTERS, 2022, 47 (03) :665-668
[8]   QUANTUM CRYPTOGRAPHY BASED ON BELL THEOREM [J].
EKERT, AK .
PHYSICAL REVIEW LETTERS, 1991, 67 (06) :661-663
[9]   Implementation of quantum key distribution surpassing the linear rate-transmittance bound [J].
Fang, Xiao-Tian ;
Zeng, Pei ;
Liu, Hui ;
Zou, Mi ;
Wu, Weijie ;
Tang, Yan-Lin ;
Sheng, Ying-Jie ;
Xiang, Yao ;
Zhang, Weijun ;
Li, Hao ;
Wang, Zhen ;
You, Lixing ;
Li, Ming-Jun ;
Chen, Hao ;
Chen, Yu-Ao ;
Zhang, Qiang ;
Peng, Cheng-Zhi ;
Ma, Xiongfeng ;
Chen, Teng-Yun ;
Pan, Jian-Wei .
NATURE PHOTONICS, 2020, 14 (07) :422-+
[10]   Bell Nonlocality Is Not Sufficient for the Security of Standard Device-Independent Quantum Key Distribution Protocols [J].
Farkas, Mate ;
Balanzo-Juando, Maria ;
Lukanowski, Karol ;
Kolodynski, Jan ;
Acin, Antonio .
PHYSICAL REVIEW LETTERS, 2021, 127 (05)