Phase-Matching Quantum Key Distribution

被引:318
作者
Ma, Xiongfeng [1 ]
Zeng, Pei [1 ]
Zhou, Hongyi [1 ]
机构
[1] Tsinghua Univ, Ctr Quantum Informat, Inst Interdisciplinary Informat Sci, Beijing 100084, Peoples R China
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
UNCONDITIONAL SECURITY;
D O I
10.1103/PhysRevX.8.031043
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Quantum key distribution allows remote parties to generate information-theoretic secure keys. The bottleneck throttling its real-life applications lies in the limited communication distance and key generation speed, due to the fact that the information carrier can be easily lost in the channel. For all the current implementations, the key rate is bounded by the channel transmission probability eta. Rather surprisingly, by matching the phases of two coherent states and encoding the key information into the common phase, this linear key-rate constraint can be overcome-the secure key rate scales with the square root of the transmission probability O(root eta), as proposed in twin-field quantum key distribution [M. Lucamarini et al. Overcoming the Rate-Distance Limit of Quantum Key Distribution without Quantum Repeaters, Nature (London) 557, 400 (2018)]. To achieve this, we develop an optical-mode-based security proof that is different from the conventional qubit-based security proofs. Furthermore, the proposed scheme is measurement device independent; i.e., it is immune to all possible detection attacks. The simulation result shows that the key rate can even exceed the transmission probability eta between two communication parties. In addition, we apply phase postcompensation to devise a practical version of the scheme without phase locking, which makes the proposed scheme feasible with the current technology. This means that quantum key distribution can enjoy both sides of the world-practicality and security.
引用
收藏
页数:26
相关论文
共 48 条
[1]  
Bennett C.H., Brassard G., Quantum Cryptography: Public Key Distribution and Coin Tossing, Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing, pp. 175-179, (1984)
[2]  
Ekert A.K., Quantum Cryptography Based on Bell's Theorem, Phys. Rev. Lett., 67, (1991)
[3]  
Mayers D., Unconditional Security in Quantum Cryptography, J. Assoc. Comput. Mach., 48, (2001)
[4]  
Lo H.K., Chau H.F., Unconditional Security of Quantum Key Distribution over Arbitrarily Long Distances, Science, 283, (1999)
[5]  
Shor P.W., Preskill J., Simple Proof of Security of the BB84 Quantum Key Distribution Protocol, Phys. Rev. Lett., 85, (2000)
[6]  
Bennett C.H., Bessette F., Brassard G., Salvail L., Smolin J., Experimental Quantum Cryptography, J. Cryptol., 5, (1992)
[7]  
Liao S.-K., Cai W.-Q., Liu W.-Y., Zhang L., Li Y., Ren J.-G., Yin J., Shen Q., Cao Y., Li Z.-P., Et al., Satellite-to-Ground Quantum Key Distribution, Nature (London), 549, (2017)
[8]  
Curty M., Lewenstein M., Lutkenhaus N., Entanglement as a Precondition for Secure Quantum Key Distribution, Phys. Rev. Lett., 92, (2004)
[9]  
Takeoka M., Guha S., Wilde M.M., Fundamental Rate-Loss Tradeoff for Optical Quantum Key Distribution, Nat. Commun., 5, (2014)
[10]  
Pirandola S., Laurenza R., Ottaviani C., Banchi L., Fundamental Limits of Repeaterless Quantum Communications, Nat. Commun., 8, (2017)