Improved Finite-Key Security Analysis of Measurement-Device-Independent Quantum Key Distribution Against a Trojan-Horse Attack

被引:5
|
作者
Ding, Hua-Jian [1 ,2 ,3 ]
Liu, Jing-Yang [1 ,2 ,3 ]
Zhou, Xing-Yu [1 ,2 ,3 ]
Zhang, Chun-Hui [1 ,2 ,3 ]
Li, Jian [1 ,2 ,3 ]
Wang, Qin [1 ,2 ,3 ]
机构
[1] Nanjing Univ Posts & Telecommun, Inst Quantum Informat & Technol, Nanjing 210003, Peoples R China
[2] NUPT, Minist Educ, Broadband Wireless Commun & Sensor Network Technol, Nanjing 210003, Peoples R China
[3] NUPT, Telecommun & Networks Natl Engn Res Ctr, Nanjing 210003, Peoples R China
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
UNCONDITIONAL SECURITY;
D O I
10.1103/PhysRevApplied.19.044022
中图分类号
O59 [应用物理学];
学科分类号
摘要
Measurement-device-independent quantum key distribution (MDI QKD) is a promising method for remote key sharing that can eliminate all detector side-channel attacks. However, current security proofs often overlook the potential information leakages from the legitimate users' devices. In a quantum version of Trojan-horse attack (THA), a malicious eavesdropper can inject bright light into the sources of a MDI QKD system and then analyze the back-reflected light to obtain their setting choices, thereby compro-mising the final security. Here, we derive the finite-key security bounds of decoy-state MDI QKD in the presence of THA, which significantly outperform previous analyses in terms of the secret-key rate and transmission distance. Specifically, we analyze a symmetric three-intensity decoy-state MDI QKD pro-tocol and an efficient four-intensity decoy-state MDI QKD protocol. Our results represent a fundamental step in guaranteeing the implementation security of quantum communication systems.
引用
收藏
页数:13
相关论文
共 50 条
  • [41] Measurement-device-independent quantum key distribution robust against environmental disturbances
    Wang, Chao
    Yin, Zhen-Qiang
    Wang, Shuang
    Chen, Wei
    Guo, Guang-Can
    Han, Zheng-Fu
    OPTICA, 2017, 4 (09): : 1016 - 1023
  • [42] Laser damage attack on continuous variable measurement-device-independent quantum key distribution: Practical security and countermeasure
    Li, Xuan
    Peng, Qingquan
    Guo, Ying
    PHYSICS LETTERS A, 2025, 534
  • [43] Security analysis against the Trojan horse attack on practical polarization-encoding quantum key distribution systems
    Luo, Tingting
    Liu, Qiang
    Sun, Xiaoran
    Huang, Chunfeng
    Chen, Ye
    Zhang, Zhenrong
    Wei, Kejin
    PHYSICAL REVIEW A, 2024, 109 (04)
  • [44] Risk Analysis of Trojan-Horse Attacks on Practical Quantum Key Distribution Systems
    Jain, Nitin
    Stiller, Birgit
    Khan, Imran
    Makarov, Vadim
    Marquardt, Christoph
    Leuchs, Gerd
    IEEE JOURNAL OF SELECTED TOPICS IN QUANTUM ELECTRONICS, 2015, 21 (03) : 168 - 177
  • [45] Finite-key security analysis of quantum key distribution with imperfect light sources
    Mizutani, Akihiro
    Curty, Marcos
    Lim, Charles Ci Wen
    Imoto, Nobuyuki
    Tamaki, Kiyoshi
    NEW JOURNAL OF PHYSICS, 2015, 17
  • [46] Measurement-device-independent quantum key distribution with insecure sources
    Ding, Hua-Jian
    Zhou, Xing-Yu
    Zhang, Chun-Hui
    Li, Jian
    Wang, Qin
    OPTICS LETTERS, 2022, 47 (03) : 665 - 668
  • [47] Practical aspects of measurement-device-independent quantum key distribution
    Xu, Feihu
    Curty, Marcos
    Qi, Bing
    Lo, Hoi-Kwong
    NEW JOURNAL OF PHYSICS, 2013, 15
  • [48] Measurement-device-independent quantum key distribution for nonstandalone networks
    Fan-Yuan, Guan-Jie
    Lu, Feng-Yu
    Wang, Shuang
    Yin, Zhen-Qiang
    He, De-Yong
    Zhou, Zheng
    Teng, Jun
    Chen, Wei
    Guo, Guang-Can
    Han, Zheng-Fu
    PHOTONICS RESEARCH, 2021, 9 (10) : 1881 - 1891
  • [49] Efficient passive measurement-device-independent quantum key distribution
    Zhang, Chun-Hui
    Zhang, Chun-Mei
    Wang, Qin
    PHYSICAL REVIEW A, 2019, 99 (05)
  • [50] Measurement-device-independent quantum key distribution with leaky sources
    Weilong Wang
    Kiyoshi Tamaki
    Marcos Curty
    Scientific Reports, 11