Improved Finite-Key Security Analysis of Measurement-Device-Independent Quantum Key Distribution Against a Trojan-Horse Attack

被引:5
|
作者
Ding, Hua-Jian [1 ,2 ,3 ]
Liu, Jing-Yang [1 ,2 ,3 ]
Zhou, Xing-Yu [1 ,2 ,3 ]
Zhang, Chun-Hui [1 ,2 ,3 ]
Li, Jian [1 ,2 ,3 ]
Wang, Qin [1 ,2 ,3 ]
机构
[1] Nanjing Univ Posts & Telecommun, Inst Quantum Informat & Technol, Nanjing 210003, Peoples R China
[2] NUPT, Minist Educ, Broadband Wireless Commun & Sensor Network Technol, Nanjing 210003, Peoples R China
[3] NUPT, Telecommun & Networks Natl Engn Res Ctr, Nanjing 210003, Peoples R China
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
UNCONDITIONAL SECURITY;
D O I
10.1103/PhysRevApplied.19.044022
中图分类号
O59 [应用物理学];
学科分类号
摘要
Measurement-device-independent quantum key distribution (MDI QKD) is a promising method for remote key sharing that can eliminate all detector side-channel attacks. However, current security proofs often overlook the potential information leakages from the legitimate users' devices. In a quantum version of Trojan-horse attack (THA), a malicious eavesdropper can inject bright light into the sources of a MDI QKD system and then analyze the back-reflected light to obtain their setting choices, thereby compro-mising the final security. Here, we derive the finite-key security bounds of decoy-state MDI QKD in the presence of THA, which significantly outperform previous analyses in terms of the secret-key rate and transmission distance. Specifically, we analyze a symmetric three-intensity decoy-state MDI QKD pro-tocol and an efficient four-intensity decoy-state MDI QKD protocol. Our results represent a fundamental step in guaranteeing the implementation security of quantum communication systems.
引用
收藏
页数:13
相关论文
共 50 条
  • [21] Security research on practical measurement-device-independent quantum key distribution
    Li, Wei
    Zhao, Shengmei
    PHYSICAL REVIEW A, 2022, 106 (04)
  • [22] Finite-key security analysis for multilevel quantum key distribution
    Bradler, Kamil
    Mirhosseini, Mohammad
    Fickler, Robert
    Broadbent, Anne
    Boyd, Robert
    NEW JOURNAL OF PHYSICS, 2016, 18
  • [23] Finite-key security against coherent attacks in quantum key distribution
    Sheridan, Lana
    Le, Thinh Phuc
    Scarani, Valerio
    NEW JOURNAL OF PHYSICS, 2010, 12
  • [24] Improved measurement-device-independent quantum key distribution with uncharacterized qubits
    Hwang, Won-Young
    Su, Hong-Yi
    Bae, Joonwoo
    PHYSICAL REVIEW A, 2017, 95 (06)
  • [25] Weak Randomness Analysis of Measurement-Device-Independent Quantum Key Distribution with Finite Resources
    Jiang, Xiao-Lei
    Deng, Xiao-Qin
    Wang, Yang
    Lu, Yi-Fei
    Li, Jia-Ji
    Zhou, Chun
    Bao, Wan-Su
    PHOTONICS, 2022, 9 (05)
  • [26] Security of finite-key-length measurement-device-independent quantum key distribution using an arbitrary number of decoys
    Chau, H. F.
    PHYSICAL REVIEW A, 2020, 102 (01)
  • [27] Finite-key bound for semi-device-independent quantum key distribution
    Zhou, Chun
    Xu, Peng
    Bao, Wan-Su
    Wang, Yang
    Zhang, Yingying
    Jiang, Mu-Sheng
    Li, Hong-Wei
    OPTICS EXPRESS, 2017, 25 (15): : 16971 - 16980
  • [28] Entanglement Measurement-Device-Independent Quantum Key Distribution
    Alshowkan, Muneer
    Elleithy, Khaled
    2017 IEEE LONG ISLAND SYSTEMS, APPLICATIONS AND TECHNOLOGY CONFERENCE (LISAT), 2017,
  • [29] Experimental Measurement-Device-Independent Quantum Key Distribution
    Liu, Yang
    Chen, Teng-Yun
    Wang, Liu-Jun
    Liang, Hao
    Shentu, Guo-Liang
    Wang, Jian
    Cui, Ke
    Yin, Hua-Lei
    Liu, Nai-Le
    Li, Li
    Ma, Xiongfeng
    Pelc, Jason S.
    Fejer, M. M.
    Peng, Cheng-Zhi
    Zhang, Qiang
    Pan, Jian-Wei
    PHYSICAL REVIEW LETTERS, 2013, 111 (13)
  • [30] Finite-key security of passive quantum key distribution
    Zapatero, Victor
    Curty, Marcos
    PHYSICAL REVIEW APPLIED, 2024, 21 (01)