Improved Finite-Key Security Analysis of Measurement-Device-Independent Quantum Key Distribution Against a Trojan-Horse Attack

被引:5
|
作者
Ding, Hua-Jian [1 ,2 ,3 ]
Liu, Jing-Yang [1 ,2 ,3 ]
Zhou, Xing-Yu [1 ,2 ,3 ]
Zhang, Chun-Hui [1 ,2 ,3 ]
Li, Jian [1 ,2 ,3 ]
Wang, Qin [1 ,2 ,3 ]
机构
[1] Nanjing Univ Posts & Telecommun, Inst Quantum Informat & Technol, Nanjing 210003, Peoples R China
[2] NUPT, Minist Educ, Broadband Wireless Commun & Sensor Network Technol, Nanjing 210003, Peoples R China
[3] NUPT, Telecommun & Networks Natl Engn Res Ctr, Nanjing 210003, Peoples R China
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
UNCONDITIONAL SECURITY;
D O I
10.1103/PhysRevApplied.19.044022
中图分类号
O59 [应用物理学];
学科分类号
摘要
Measurement-device-independent quantum key distribution (MDI QKD) is a promising method for remote key sharing that can eliminate all detector side-channel attacks. However, current security proofs often overlook the potential information leakages from the legitimate users' devices. In a quantum version of Trojan-horse attack (THA), a malicious eavesdropper can inject bright light into the sources of a MDI QKD system and then analyze the back-reflected light to obtain their setting choices, thereby compro-mising the final security. Here, we derive the finite-key security bounds of decoy-state MDI QKD in the presence of THA, which significantly outperform previous analyses in terms of the secret-key rate and transmission distance. Specifically, we analyze a symmetric three-intensity decoy-state MDI QKD pro-tocol and an efficient four-intensity decoy-state MDI QKD protocol. Our results represent a fundamental step in guaranteeing the implementation security of quantum communication systems.
引用
收藏
页数:13
相关论文
共 50 条
  • [1] Finite-key security analysis against the Trojan-horse attack on practical reference-frame-independent measurement-device-independent quantum key distribution
    Zhou, Yang
    Ding, Hua-Jian
    Zhang, Chun-Hui
    Zhou, Xing-Yu
    Wang, Qin
    PHYSICAL REVIEW APPLIED, 2025, 23 (02):
  • [2] Improved finite-key security analysis of quantum key distribution against Trojan-horse attacks
    Navarrete, Alvaro
    Curty, Marcos
    QUANTUM SCIENCE AND TECHNOLOGY, 2022, 7 (03)
  • [3] Finite-key analysis for measurement-device-independent quantum key distribution
    Song, Ting-Ting
    Wen, Qiao-Yan
    Guo, Fen-Zhuo
    Tan, Xiao-Qing
    PHYSICAL REVIEW A, 2012, 86 (02):
  • [4] Finite-key analysis for measurement-device-independent quantum key distribution
    Curty, Marcos
    Xu, Feihu
    Cui, Wei
    Lim, Charles Ci Wen
    Tamaki, Kiyoshi
    Lo, Hoi-Kwong
    NATURE COMMUNICATIONS, 2014, 5
  • [5] Finite-key analysis for measurement-device-independent quantum key distribution
    Marcos Curty
    Feihu Xu
    Wei Cui
    Charles Ci Wen Lim
    Kiyoshi Tamaki
    Hoi-Kwong Lo
    Nature Communications, 5
  • [6] Practical Security Bounds Against the Trojan-Horse Attack in Quantum Key Distribution
    Lucamarini, M.
    Choi, I.
    Ward, M. B.
    Dynes, J. F.
    Yuan, Z. L.
    Shields, A. J.
    PHYSICAL REVIEW X, 2015, 5 (03):
  • [7] Improved security bounds against the Trojan-horse attack in decoy-state quantum key distribution
    Zijian Li
    Bingbing Zheng
    Chengxian Zhang
    Zhenrong Zhang
    Hong-Bo Xie
    Kejin Wei
    Quantum Information Processing, 23
  • [8] Improved security bounds against the Trojan-horse attack in decoy-state quantum key distribution
    Li, Zijian
    Zheng, Bingbing
    Zhang, Chengxian
    Zhang, Zhenrong
    Xie, Hong-Bo
    Wei, Kejin
    QUANTUM INFORMATION PROCESSING, 2024, 23 (02)
  • [9] Extended analysis of the Trojan-horse attack in quantum key distribution
    Vinay, Scott E.
    Kok, Pieter
    PHYSICAL REVIEW A, 2018, 97 (04)
  • [10] Chip-Based Quantum Key Distribution against Trojan-Horse Attack
    Tan, Han
    Li, Wei
    Zhang, Likang
    Wei, Kejin
    Xu, Feihu
    PHYSICAL REVIEW APPLIED, 2021, 15 (06)