Finite-key security analysis of the 1-decoy state QKD protocol with a leaky intensity modulator

被引:3
作者
Wang, Weilong [1 ,2 ]
Meng, Xiangdong [1 ,2 ]
Fei, Yangyang [1 ,2 ]
Ma, Zhi [1 ,2 ]
机构
[1] State Key Lab Math Engn & Adv Comp, Zhengzhou 450001, Henan, Peoples R China
[2] Henan Key Lab Network Cryptog Technol, Zhengzhou 450001, Henan, Peoples R China
基金
中国国家自然科学基金;
关键词
Quantum key distribution; One-decoy protocol; Information leakage; Intensity modulator; Finite-key security analysis;
D O I
10.1007/s11128-020-02694-6
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
The finite-key security of the standard three-intensity decoy-state quantum key distribution (QKD) protocol in the presence of information leakage has been analyzed (Wang et al. in New J Phys 20:083027, 2018). On the other hand, the 1-decoy state QKD protocol has been proved to be able to achieve higher secret key rate than the three-intensity decoy-state QKD protocol in the finite-key regime by using only two different intensity settings (Davide et al. in Appl Phys Lett 112:171104, 2018). In this work, we analyze the finite-key security of the 1-decoy state QKD protocol with a leaky intensity modulator, which is used to generate the decoy state. In particular, we simulate the secret key rate under three practical cases of Trojan-horse attacks. Our simulation results demonstrate that the 1-decoy state QKD protocol can be secure over long distances within a reasonable time frame given that the intensity modulator is sufficiently isolated. By comparing the simulation results to those presented in Wang et al. (2018), we find that, as expected, the 1-decoy state QKD protocol is more robust against information leakage from the intensity modulator for all achievable distances.
引用
收藏
页数:16
相关论文
共 25 条
[1]  
[Anonymous], 2000, QUANTUM INFORM QUANT
[2]  
[Anonymous], 1984, P IEEE INT C COMP, DOI DOI 10.1016/J.TCS.2014.05.025
[3]  
Azuma Kazuoki, 1967, Tohoku Mathematical Journal, Second Series, V19, P357, DOI DOI 10.2748/TMJ/1178243286
[4]   Finite-key analysis for measurement-device-independent quantum key distribution [J].
Curty, Marcos ;
Xu, Feihu ;
Cui, Wei ;
Lim, Charles Ci Wen ;
Tamaki, Kiyoshi ;
Lo, Hoi-Kwong .
NATURE COMMUNICATIONS, 2014, 5
[5]   Long-distance quantum key distribution secure against coherent attacks [J].
Frohlich, Bernd ;
Lucamarini, Marco ;
Dynes, James F. ;
Comandar, Lucian C. ;
Tam, Winci W. -S. ;
Plews, Alan ;
Sharpe, Andrew W. ;
Yuan, Zhiliang ;
Shields, Andrew J. .
OPTICA, 2017, 4 (01) :163-167
[6]   Quantum key distribution with high loss: Toward global secure communication [J].
Hwang, WY .
PHYSICAL REVIEW LETTERS, 2003, 91 (05) :579011-579014
[7]   Satellite-to-ground quantum key distribution [J].
Liao, Sheng-Kai ;
Cai, Wen-Qi ;
Liu, Wei-Yue ;
Zhang, Liang ;
Li, Yang ;
Ren, Ji-Gang ;
Yin, Juan ;
Shen, Qi ;
Cao, Yuan ;
Li, Zheng-Ping ;
Li, Feng-Zhi ;
Chen, Xia-Wei ;
Sun, Li-Hua ;
Jia, Jian-Jun ;
Wu, Jin-Cai ;
Jiang, Xiao-Jun ;
Wang, Jian-Feng ;
Huang, Yong-Mei ;
Wang, Qiang ;
Zhou, Yi-Lin ;
Deng, Lei ;
Xi, Tao ;
Ma, Lu ;
Hu, Tai ;
Zhang, Qiang ;
Chen, Yu-Ao ;
Liu, Nai-Le ;
Wang, Xiang-Bin ;
Zhu, Zhen-Cai ;
Lu, Chao-Yang ;
Shu, Rong ;
Peng, Cheng-Zhi ;
Wang, Jian-Yu ;
Pan, Jian-Wei .
NATURE, 2017, 549 (7670) :43-+
[8]   Concise security bounds for practical decoy-state quantum key distribution [J].
Lim, Charles Ci Wen ;
Curty, Marcos ;
Walenta, Nino ;
Xu, Feihu ;
Zbinden, Hugo .
PHYSICAL REVIEW A, 2014, 89 (02)
[9]   Decoy-state quantum key distribution with polarized photons over 200 km [J].
Liu, Yang ;
Chen, Teng-Yun ;
Wang, Jian ;
Cai, Wen-Qi ;
Wan, Xu ;
Chen, Luo-Kan ;
Wang, Jin-Hong ;
Liu, Shu-Bin ;
Liang, Hao ;
Yang, Lin ;
Peng, Cheng-Zhi ;
Chen, Kai ;
Chen, Zeng-Bing ;
Pan, Jian-Wei .
OPTICS EXPRESS, 2010, 18 (08) :8587-8594
[10]   Decoy state quantum key distribution [J].
Lo, HK ;
Ma, XF ;
Chen, K .
PHYSICAL REVIEW LETTERS, 2005, 94 (23)