Security of quantum key distribution with intensity correlations

被引:25
|
作者
Zapatero, Victor [1 ]
Navarrete, Alvaro [1 ]
Tamaki, Kiyoshi [2 ]
Curty, Marcos [1 ]
机构
[1] Univ Vigo, Dept Signal Theory & Commun, Escuela Ingn Telecomunicac, E-36310 Vigo, Spain
[2] Univ Toyama, Fac Engn, Gofuku 3190, Toyama 9308555, Japan
来源
QUANTUM | 2021年 / 5卷
关键词
PROBABILITY-INEQUALITIES;
D O I
10.22331/q-2021-12-07-602
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
The decoy-state method in quantum key distribution (QKD) is a popular technique to approximately achieve the performance of ideal single-photon sources by means of simpler and practical laser sources. In high-speed decoystate QKD systems, however, intensity correlations between succeeding pulses leak information about the users' intensity settings, thus invalidating a key assumption of this approach. Here, we solve this pressing problem by developing a general technique to incorporate arbitrary intensity correlations to the security analysis of decoy-state QKD. This technique only requires to experimentally quantify two main parameters: the correlation range and the maximum relative deviation between the selected and the actually emitted intensities. As a side contribution, we provide a non-standard derivation of the asymptotic secret key rate formula from the non-asymptotic one, in so revealing a necessary condition for the significance of the former.
引用
收藏
页码:1 / 27
页数:27
相关论文
共 50 条
  • [1] Intensity correlations in measurement-device-independent quantum key distribution
    Liu, Junxuan
    Xing, Tianyi
    Liu, Ruiyin
    Chen, Zihao
    Tan, Hao
    Huang, Anqi
    OPTICS EXPRESS, 2024, 32 (22): : 38394 - 38406
  • [2] Security of Quantum Key Distribution
    Beaudry, Normand
    Ferenczi, Agnes
    Narasimhachar, Varun
    Moroder, Tobias
    Ma, Xiongfeng
    Piani, Marco
    Luekenhaus, Norbert
    2010 CONFERENCE ON OPTICAL FIBER COMMUNICATION OFC COLLOCATED NATIONAL FIBER OPTIC ENGINEERS CONFERENCE OFC-NFOEC, 2010,
  • [3] Security of quantum key distribution
    Renner, Renato
    INTERNATIONAL JOURNAL OF QUANTUM INFORMATION, 2008, 6 (01) : 1 - 127
  • [4] Security of Quantum Key Distribution
    Yuen, Horace P.
    IEEE ACCESS, 2016, 4 : 724 - 749
  • [5] Quantum correlations for quantum key distribution protocols
    Curty, M
    Gühnet, O
    Lewenstein, M
    Lütkenhaus, N
    QUANTUM COMMUNICATION, MEASUREMENT AND COMPUTING, 2004, 734 : 307 - 310
  • [6] Detecting quantum correlations for quantum key distribution
    Curty, M
    Gühne, O
    Lewenstein, M
    Lütkenhaus, N
    QUANTUM OPTICS AND APPLICATIONS IN COMPUTING AND COMMUNICATIONS II, 2005, 5631 : 9 - 19
  • [7] Security of Decoy-State Quantum Key Distribution with Correlated Intensity Fluctuations
    Sixto, Xoel
    Zapatero, Victor
    Curty, Marcos
    PHYSICAL REVIEW APPLIED, 2022, 18 (04)
  • [8] Security of a control key in quantum key distribution
    Rehman, Junaid Ur
    Qaisar, Saad
    Jeong, Youngmin
    Shin, Hyundong
    MODERN PHYSICS LETTERS B, 2017, 31 (11):
  • [9] On the Security of Quantum Key Distribution Networks
    Lella, Eufemia
    Schmid, Giovanni
    CRYPTOGRAPHY, 2023, 7 (04)
  • [10] Security Proof of Quantum Key Distribution
    Tamaki, Kiyoshi
    Tsurumaru, Toyohiro
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2010, E93A (05) : 880 - 888