Security of the Decoy-State BB84 Protocol with Imperfect State Preparation

被引:1
|
作者
Reutov, Aleksei [1 ]
Tayduganov, Andrey [1 ]
Mayboroda, Vladimir [1 ]
Fat'yanov, Oleg [1 ]
机构
[1] Natl Univ Sci & Technol MISIS, Lab Quantum Informat Technol, Moscow 119049, Russia
关键词
quantum communication; quantum key distribution; BB84; source flaw; QUANTUM KEY DISTRIBUTION; INFORMATION LEAKAGE; SIDE CHANNELS; SCHEME; PROOF;
D O I
10.3390/e25111556
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
The quantum key distribution (QKD) allows two remote users to share a common information-theoretic secure secret key. In order to guarantee the security of a practical QKD implementation, the physical system has to be fully characterized and all deviations from the ideal protocol due to various imperfections of realistic devices have to be taken into account in the security proof. In this work, we study the security of the efficient decoy-state BB84 QKD protocol in the presence of the source flaws, caused by imperfect intensity and polarization modulation. We investigate the non-Poissonian photon-number statistics due to coherent-state intensity fluctuations and the basis-dependence of the source due to non-ideal polarization state preparation. The analysis is supported by the experimental characterization of intensity and phase distributions.
引用
收藏
页数:18
相关论文
共 50 条
  • [1] Optimizing the decoy-state BB84 QKD protocol parameters
    Attema, Thomas
    Bosman, Joost W.
    Neumann, Niels M. P.
    QUANTUM INFORMATION PROCESSING, 2021, 20 (04)
  • [2] Optimizing the decoy-state BB84 QKD protocol parameters
    Thomas Attema
    Joost W. Bosman
    Niels M. P. Neumann
    Quantum Information Processing, 2021, 20
  • [3] Decoy-state BB84 protocol using space division multiplexing in silicon
    Bacco, Davide
    Ding, Yunhong
    Dalgaard, Kjeld
    Rottwitt, Karsten
    Oxenlowe, Leif Katsuo
    2017 CONFERENCE ON LASERS AND ELECTRO-OPTICS EUROPE & EUROPEAN QUANTUM ELECTRONICS CONFERENCE (CLEO/EUROPE-EQEC), 2017,
  • [4] Practical underwater quantum key distribution based on decoy-state BB84 protocol
    Dong, Shanchuan
    Yu, Yonghe
    Zheng, Shangshuai
    Zhu, Qiming
    Gai, Lei
    Li, Wendong
    Gu, Yongjian
    APPLIED OPTICS, 2022, 61 (15) : 4471 - 4477
  • [5] Technical requirement and test method specifications for decoy-state BB84 protocol QKD system
    Lai, Jun-sen
    Liu, Lu
    Zhao, Xin
    Tang, Xiao-hua
    Tang, Rui
    Zhao, Wen-yu
    Zhang, Hal-yi
    2020 ASIA COMMUNICATIONS AND PHOTONICS CONFERENCE (ACP) AND INTERNATIONAL CONFERENCE ON INFORMATION PHOTONICS AND OPTICAL COMMUNICATIONS (IPOC), 2020,
  • [6] Practical decoy-state BB84 quantum key distribution with quantum memory
    李咸柯
    宋小谦
    郭其伟
    周星宇
    王琴
    Chinese Physics B, 2021, (06) : 77 - 80
  • [7] Practical decoy-state BB84 quantum key distribution with quantum memory*
    Li, Xian-Ke
    Song, Xiao-Qian
    Guo, Qi-Wei
    Zhou, Xing-Yu
    Wang, Qin
    CHINESE PHYSICS B, 2021, 30 (06)
  • [8] Numerical security proof for the decoy-state BB84 protocol and measurement-device-independent quantum key distribution resistant against large basis misalignment
    Wang, Wenyuan
    Lutkenhaus, Norbert
    PHYSICAL REVIEW RESEARCH, 2022, 4 (04):
  • [9] On the Availability of the Decoy State BB84 QKD over a Terrestrial FSO Link
    Ntanos, Argiris
    Zavitsanos, Dimitris
    Lyras, Nikolaos K.
    Giannoulis, Giannis
    Avramopoulos, Hercules
    2021 INTERNATIONAL CONFERENCE ON OPTICAL NETWORK DESIGN AND MODELLING (ONDM), 2021,
  • [10] Security of BB84 with weak randomness and imperfect qubit encoding
    Zhao, Liang-Yuan
    Yin, Zhen-Qiang
    Li, Hong-Wei
    Chen, Wei
    Fang, Xi
    Han, Zheng-Fu
    Huang, Wei
    QUANTUM INFORMATION PROCESSING, 2018, 17 (03)