Phase-matching quantum key distribution with light source monitoring

2021 ◽  
Author(s):  
Wen-Ting Li ◽  
Le Wang ◽  
Wei Li ◽  
Sheng-Mei Zhao

Abstract The transmission loss of photons during quantum key distribution(QKD) process leads to the linear key rate bound for practical QKD systems without quantum repeaters. Phase matching quantum key distribution (PM-QKD) protocol, an novel QKD protocol, can overcome the constraint with a measurement-device-independent structure, while it still requires the light source to be ideal. This assumption is not guaranteed in practice, leading to practical secure issues. In this paper, we propose a modified PM-QKD protocol with a light source monitoring, named PM-QKD-LSM protocol, which can guarantee the security of the system under the non-ideal source condition. The results show that our proposed protocol performs almost the same as the ideal PM-QKD protocol even considering the imperfect factors in practical systems. PM-QKD-LSM protocol has a better performance with source fluctuation, and it is robust in symmetric or asymmetric cases.

2019 ◽  
Vol 34 (04) ◽  
pp. 2050063
Author(s):  
Yefeng He ◽  
Wenping Ma

With heralded pair coherent states (HPCS), orbital angular momentum (OAM) states and pulse position modulation (PPM) technology, a decoy-state measurement-device-independent quantum key distribution (MDI-QKD) protocol is proposed. OAM states and PPM technology are used to realize the coding of the signal states in the HPCS light source. The use of HPCS light source, OAM coding and PPM coding cannot only reduce the error rate but also improve the key generation rate and communication distance. The new MDI-QKD protocol also employs three-intensity decoy states to avoid the attacks against the light source. By calculating the error rate and key generation rate, the performance of the MDI-QKD protocol is analyzed. Numerical simulation shows that the protocol has very low error rate and very high key generation rate. Moreover, the maximum communication distance can reach 455 km.


Entropy ◽  
2019 ◽  
Vol 22 (1) ◽  
pp. 36
Author(s):  
Yucheng Qiao ◽  
Ziyang Chen ◽  
Yichen Zhang ◽  
Bingjie Xu ◽  
Hong Guo

Twin-field quantum key distribution (TF-QKD) is proposed to achieve a remote key distribution with a maximum secure transmission distance up to over 500 km. Although the security of TF-QKD in its detection part is guaranteed, there are some remaining problems in the source part. The sending-or-not-sending (SNS) protocol is proposed to solve the security problem in the phase post-selection process; however, the light source is still assumed to be an ideal coherent state. This assumption is not satisfied in real-life QKD systems, leading to practical secure issues. In this paper, we discuss the condition that the photon number distribution (PND) of the source is unknown for the SNS protocol, demonstrate that the security analysis is still valid under a source with unknown PND, and show that with light source monitoring, the performance of the SNS protocol can remain almost unchanged.


2021 ◽  
Vol 11 (1) ◽  
Author(s):  
Weilong Wang ◽  
Kiyoshi Tamaki ◽  
Marcos Curty

AbstractMeasurement-device-independent quantum key distribution (MDI-QKD) can remove all detection side-channels from quantum communication systems. The security proofs require, however, that certain assumptions on the sources are satisfied. This includes, for instance, the requirement that there is no information leakage from the transmitters of the senders, which unfortunately is very difficult to guarantee in practice. In this paper we relax this unrealistic assumption by presenting a general formalism to prove the security of MDI-QKD with leaky sources. With this formalism, we analyze the finite-key security of two prominent MDI-QKD schemes—a symmetric three-intensity decoy-state MDI-QKD protocol and a four-intensity decoy-state MDI-QKD protocol—and determine their robustness against information leakage from both the intensity modulator and the phase modulator of the transmitters. Our work shows that MDI-QKD is feasible within a reasonable time frame of signal transmission given that the sources are sufficiently isolated. Thus, it provides an essential reference for experimentalists to ensure the security of implementations of MDI-QKD in the presence of information leakage.


2020 ◽  
Vol 125 (26) ◽  
Author(s):  
Yuan Cao ◽  
Yu-Huai Li ◽  
Kui-Xing Yang ◽  
Yang-Fan Jiang ◽  
Shuang-Lin Li ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document