Measurement-device-independent quantum key distribution with uncharacterized coherent sources

被引:0
作者
Guo-Dong Kang
Qing-Ping Zhou
Mao-Fa Fang
机构
[1] JiShou University,Key Laboratory of Software Engineering of Ministry of Education, and School of Software
[2] Jishou University,School of Physics and Mechanical and Electrical Engineering
[3] Hunan Normal University,Key Laboratory of Low
来源
Quantum Information Processing | 2020年 / 19卷
关键词
Quantum key distribution; Measurement-device-independent; Uncharacterized coherent sources;
D O I
暂无
中图分类号
学科分类号
摘要
Measurement-device-independent quantum key distribution (MDI-QKD) is proposed to close all possible side channel detector attacks. The security of the original proposal relies on the assumption that the legitimate users can characterize their sources exactly, which might not be satisfied in practice. Later, some MDI-QKD protocols with uncharacterized qubit sources are proposed to remove the assumption that legitimate users must characterize their encoding states. Here we propose a MDI-QKD with uncharacterized coherent sources. The assumption is that legitimate users only ensure that sources, for encoding, are coherent sources (can be expressed as a mixture of Fock states), while the accuracy of the encoding operations and the intensity of the coherent sources cannot be characterized exactly by them. Based on this assumption, we derived the formulas of the security bounds for it under collective attacks, and simulation results of the security bounds are also presented by employing parameters of current QKD technology. It shows that the lower bound of performance can cover long distances.
引用
收藏
相关论文
共 285 条
[1]  
Ekert AK(1991)Quantum cryptography based on Bell’s theorem Phys. Rev. Lett. 67 661-663
[2]  
Lo H-K(1999)Unconditional security of quantum key distribution over arbitrarily long distances Science 283 2050-2056
[3]  
Chau HF(2000)Simple proof of security of the BB84 quantum key distribution protocol Phys. Rev. Lett. 85 441-444
[4]  
Shor PW(2001)Quantum cryptography Rev. Mod. Phys. 74 145-200
[5]  
Preskill J(2018)Secure quantum key distribution over 421 km of optical fiber Phys. Rev. Lett. 121 9-13
[6]  
Gisin N(2017)Satellite-to-ground quantum key distribution Nature 549 43-47
[7]  
Ribordy G(2008)Erratum: effects of detector efficiency mismatch on security of quantum cryptosystems Phys. Rev. A 78 011905-011915
[8]  
Tittel W(2008)Fakes states attack using detector efficiency mismatch on SARG04, phase-time, DPSK, and Ekert protocols Quantum Inf. Comput. 8 622-635
[9]  
Zbinden HG(2007)Time-shift attack in practical quantum cryptosystems Quantum Inf. Comput. 7 73-82
[10]  
Boaron A(2008)Quantum hacking: experimental demonstration of time-shift attack against practical quantum key distribution systems Phys. Rev. A 78 042333-042337