scholarly journals Sending or Not-Sending Twin-Field Quantum Key Distribution with Flawed and Leaky Sources

Entropy ◽  
2021 ◽  
Vol 23 (9) ◽  
pp. 1103
Author(s):  
Yi-Fei Lu ◽  
Yang Wang ◽  
Mu-Sheng Jiang ◽  
Xiao-Xu Zhang ◽  
Fan Liu ◽  
...  

Twin-field quantum key distribution (TF-QKD) has attracted considerable attention and developed rapidly due to its ability to surpass the fundamental rate-distance limit of QKD. However, the device imperfections may compromise its practical implementations. The goal of this paper is to make it robust against the state preparation flaws (SPFs) and side channels at the light source. We adopt the sending or not-sending (SNS) TF-QKD protocol to accommodate the SPFs and multiple optical modes in the emitted states. We analyze that the flaws of the phase modulation can be overcome by regarding the deviation of the phase as phase noise and eliminating it with the post-selection of phase. To overcome the side channels, we extend the generalized loss-tolerant (GLT) method to the four-intensity decoy-state SNS protocol. Remarkably, by decomposing of the two-mode single-photon states, the phase error rate can be estimated with only four parameters. The practical security of the SNS protocol with flawed and leaky source can be guaranteed. Our results might constitute a crucial step towards guaranteeing the practical implementation of the SNS protocol.

2008 ◽  
Vol 100 (9) ◽  
Author(s):  
Qin Wang ◽  
Wei Chen ◽  
Guilherme Xavier ◽  
Marcin Swillo ◽  
Tao Zhang ◽  
...  

2017 ◽  
Vol 34 (12) ◽  
pp. 120301 ◽  
Author(s):  
Jia-Ji Li ◽  
Yang Wang ◽  
Hong-Wei Li ◽  
Peng Peng ◽  
Chun Zhou ◽  
...  

2008 ◽  
Vol 57 (2) ◽  
pp. 678
Author(s):  
Mi Jing-Long ◽  
Wang Fa-Qiang ◽  
Lin Qing-Qun ◽  
Liang Rui-Sheng ◽  
Liu Song-Hao

2020 ◽  
Vol 10 (1) ◽  
Author(s):  
Shi-Hai Sun ◽  
Zhi-Yu Tian ◽  
Mei-Sheng Zhao ◽  
Yan Ma

Abstract Quantum key distribution (QKD) can share an unconditional secure key between two remote parties, but the deviation between theory and practice will break the security of the generated key. In this paper, we evaluate the security of QKD with weak basis-choice flaws, in which the random bits used by Alice and Bob are weakly controlled by Eve. Based on the definition of Li et al. (Sci Rep 5:16200, 2015) and GLLP’s analysis, we obtain a tight and analytical bound to estimate the phase error and key rate for both the single photon source and the weak coherent source. Our approach largely increases the key rate from that of the original approach. Finally, we investigate and confirm the security of BB84-QKD with a practical commercial devices.


2008 ◽  
Vol 17 (4) ◽  
pp. 1178-1183 ◽  
Author(s):  
Mi Jing-Long ◽  
Wang Fa-Qiang ◽  
Lin Qing-Qun ◽  
Liang Rui-Sheng

Sign in / Sign up

Export Citation Format

Share Document