Measurement-Device-Independent Quantum Key Distribution

被引:1680
作者
Lo, Hoi-Kwong [1 ,2 ]
Curty, Marcos [3 ]
Qi, Bing [1 ,2 ]
机构
[1] Univ Toronto, Ctr Quantum Informat & Quantum Control, Dept Elect & Comp Engn, Toronto, ON M5S 3G4, Canada
[2] Univ Toronto, Dept Phys, Toronto, ON M5S 3G4, Canada
[3] Univ Vigo, Dept Signal Theory & Commun, Escuela Ingn Telecomunicac, Vigo 36310, Pontevedra, Spain
基金
加拿大自然科学与工程研究理事会;
关键词
UNCONDITIONAL SECURITY; CRYPTOGRAPHY; PROOF;
D O I
10.1103/PhysRevLett.108.130503
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
How to remove detector side channel attacks has been a notoriously hard problem in quantum cryptography. Here, we propose a simple solution to this problem-measurement-device-independent quantum key distribution (QKD). It not only removes all detector side channels, but also doubles the secure distance with conventional lasers. Our proposal can be implemented with standard optical components with low detection efficiency and highly lossy channels. In contrast to the previous solution of full device independent QKD, the realization of our idea does not require detectors of near unity detection efficiency in combination with a qubit amplifier (based on teleportation) or a quantum nondemolition measurement of the number of photons in a pulse. Furthermore, its key generation rate is many orders of magnitude higher than that based on full device independent QKD. The results show that long-distance quantum cryptography over say 200 km will remain secure even with seriously flawed detectors.
引用
收藏
页数:5
相关论文
共 37 条
[1]   Device-independent security of quantum cryptography against collective attacks [J].
Acin, Antonio ;
Brunner, Nicolas ;
Gisin, Nicolas ;
Massar, Serge ;
Pironio, Stefano ;
Scarani, Valerio .
PHYSICAL REVIEW LETTERS, 2007, 98 (23)
[2]  
Bennett C. H., 1984, IBM Technical Disclosure Bulletin, V26, P4363
[3]  
Bennett C. H., 2014, Theoretical computer science, P175, DOI [DOI 10.1016/J.TCS.2014.05.025, 10.1016/j.tcs.2014.05.025]
[4]   Quantum cryptographic network based on quantum memories [J].
Biham, E ;
Huttner, B ;
Mor, T .
PHYSICAL REVIEW A, 1996, 54 (04) :2651-2658
[5]   Experimental quantum teleportation [J].
Bouwmeester, D ;
Pan, JW ;
Mattle, K ;
Eibl, M ;
Weinfurter, H ;
Zeilinger, A .
NATURE, 1997, 390 (6660) :575-579
[6]   Side-Channel-Free Quantum Key Distribution [J].
Braunstein, Samuel L. ;
Pirandola, Stefano .
PHYSICAL REVIEW LETTERS, 2012, 108 (13)
[7]   Optimal eavesdropping in quantum cryptography with six states [J].
Bruss, D .
PHYSICAL REVIEW LETTERS, 1998, 81 (14) :3018-3021
[8]   Heralded-qubit amplifiers for practical device-independent quantum key distribution [J].
Curty, Marcos ;
Moroder, Tobias .
PHYSICAL REVIEW A, 2011, 84 (01)
[9]   Phase-remapping attack in practical quantum-key-distribution systems [J].
Fung, Chi-Hang Fred ;
Qi, Bing ;
Tamaki, Kiyoshi ;
Lo, Hoi-Kwong .
PHYSICAL REVIEW A, 2007, 75 (03)
[10]   Full-field implementation of a perfect eavesdropper on a quantum cryptography system [J].
Gerhardt, Ilja ;
Liu, Qin ;
Lamas-Linares, Anta ;
Skaar, Johannes ;
Kurtsiefer, Christian ;
Makarov, Vadim .
NATURE COMMUNICATIONS, 2011, 2