Practical passive decoy state measurement-device-independent quantum key distribution with unstable sources

被引:6
作者
Liu, Li [1 ,2 ]
Guo, Fen-Zhuo [1 ,2 ]
Wen, Qiao-Yan [1 ]
机构
[1] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
[2] Beijing Univ Posts & Telecommun, Sch Sci, Beijing 100876, Peoples R China
来源
SCIENTIFIC REPORTS | 2017年 / 7卷
基金
中国国家自然科学基金;
关键词
SECURITY;
D O I
10.1038/s41598-017-09367-y
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Measurement-device-independent quantum key distribution (MDI-QKD) with the active decoy state method can remove all detector loopholes, and resist the imperfections of sources. But it may lead to side channel attacks and break the security of QKD system. In this paper, we apply the passive decoy state method to the MDI-QKD based on polarization encoding mode. Not only all attacks on detectors can be removed, but also the side channel attacks on sources can be overcome. We get that the MDI-QKD with our passive decoy state method can have a performance comparable to the protocol with the active decoy state method. To fit for the demand of practical application, we discuss intensity fluctuation in the security analysis of MDI-QKD protocol using passive decoy state method, and derive the key generation rate for our protocol with intensity fluctuation. It shows that intensity fluctuation has an adverse effect on the key generation rate which is non-negligible, especially in the case of small data size of total transmitting signals and long distance transmission. We give specific simulations on the relationship between intensity fluctuation and the key generation rate. Furthermore, the statistical fluctuation due to the finite length of data is also taken into account.
引用
收藏
页数:10
相关论文
共 40 条
  • [1] Simple and efficient quantum key distribution with parametric down-conversion
    Adachi, Yoritoshi
    Yamamoto, Takashi
    Koashi, Masato
    Imoto, Nobuyuki
    [J]. PHYSICAL REVIEW LETTERS, 2007, 99 (18)
  • [2] Bennett C.H., 1984, PROC IEEE INT C COMP, P175, DOI DOI 10.1016/J.TCS.2014.05.025
  • [3] Limitations on practical quantum cryptography
    Brassard, G
    Lütkenhaus, N
    Mor, T
    Sanders, BC
    [J]. PHYSICAL REVIEW LETTERS, 2000, 85 (06) : 1330 - 1333
  • [4] Passive decoy-state quantum key distribution with practical light sources
    Curty, Marcos
    Ma, Xiongfeng
    Qi, Bing
    Moroder, Tobias
    [J]. PHYSICAL REVIEW A, 2010, 81 (02)
  • [5] Non-Poissonian statistics from Poissonian light sources with application to passive decoy state quantum key distribution
    Curty, Marcos
    Moroder, Tobias
    Ma, Xiongfeng
    Luetkenhaus, Norbert
    [J]. OPTICS LETTERS, 2009, 34 (20) : 3238 - 3240
  • [6] FerreiradaSilva T., 2013, PHYS REV A, V88
  • [7] Quantum cryptography
    Gisin, N
    Ribordy, GG
    Tittel, W
    Zbinden, H
    [J]. REVIEWS OF MODERN PHYSICS, 2002, 74 (01) : 145 - 195
  • [8] Gottesman D, 2004, QUANTUM INF COMPUT, V4, P325
  • [9] Reexamination of the decoy-state quantum key distribution with an unstable source
    Hu, Jia-Zhong
    Wang, Xiang-Bin
    [J]. PHYSICAL REVIEW A, 2010, 82 (01):
  • [10] Wavelength-selected photon-number-splitting attack against plug-and-play quantum key distribution systems with decoy states
    Jiang, Mu-Sheng
    Sun, Shi-Hai
    Li, Chun-Yan
    Liang, Lin-Mei
    [J]. PHYSICAL REVIEW A, 2012, 86 (03):