Security of quantum key distribution with intensity correlations

被引:25
|
作者
Zapatero, Victor [1 ]
Navarrete, Alvaro [1 ]
Tamaki, Kiyoshi [2 ]
Curty, Marcos [1 ]
机构
[1] Univ Vigo, Dept Signal Theory & Commun, Escuela Ingn Telecomunicac, E-36310 Vigo, Spain
[2] Univ Toyama, Fac Engn, Gofuku 3190, Toyama 9308555, Japan
来源
QUANTUM | 2021年 / 5卷
关键词
PROBABILITY-INEQUALITIES;
D O I
10.22331/q-2021-12-07-602
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
The decoy-state method in quantum key distribution (QKD) is a popular technique to approximately achieve the performance of ideal single-photon sources by means of simpler and practical laser sources. In high-speed decoystate QKD systems, however, intensity correlations between succeeding pulses leak information about the users' intensity settings, thus invalidating a key assumption of this approach. Here, we solve this pressing problem by developing a general technique to incorporate arbitrary intensity correlations to the security analysis of decoy-state QKD. This technique only requires to experimentally quantify two main parameters: the correlation range and the maximum relative deviation between the selected and the actually emitted intensities. As a side contribution, we provide a non-standard derivation of the asymptotic secret key rate formula from the non-asymptotic one, in so revealing a necessary condition for the significance of the former.
引用
收藏
页码:1 / 27
页数:27
相关论文
共 50 条
  • [21] Simple security proofs for continuous variable quantum key distribution with intensity fluctuating sources
    Chenyang Li
    Li Qian
    Hoi-Kwong Lo
    npj Quantum Information, 7
  • [22] Quantum key distribution with unbounded pulse correlations
    Pereira, Margarida
    Curras-Lorenzo, Guillermo
    Mizutani, Akihiro
    Rusca, Davide
    Curty, Marcos
    Tamaki, Kiyoshi
    QUANTUM SCIENCE AND TECHNOLOGY, 2025, 10 (01):
  • [23] Security analysis of continuous variable quantum key distribution based on entangled states with biased correlations
    Zhang, Wenhui
    Li, Ruixin
    Wang, Yajun
    Wang, Xuyang
    Tian, Long
    Zheng, Yaohui
    OPTICS EXPRESS, 2021, 29 (14) : 22623 - 22635
  • [24] Security of quantum key distribution with iterative sifting
    Tamaki, Kiyoshi
    Lo, Hoi-Kwong
    Mizutani, Akihiro
    Kato, Go
    Lim, Charles Ci Wen
    Azuma, Koji
    Curty, Marcos
    QUANTUM SCIENCE AND TECHNOLOGY, 2018, 3 (01):
  • [25] The security and recent technology of quantum key distribution
    Wang X.-B.
    Ying H.
    Ma H.-X.
    Peng C.-Z.
    Yang T.
    Pan J.-W.
    Frontiers of Physics in China, 2006, 1 (3): : 251 - 255
  • [26] Security analysis of quantum key distribution protocol
    Omine T.
    Yamada C.
    Miyagi K.
    Ichikawa S.
    IEEJ Transactions on Industry Applications, 2016, 136 (10) : 698 - 702
  • [27] Security of quantum key distribution with imperfect devices
    Gottesman, D
    Lo, HK
    Lütkenhaus, N
    Preskill, J
    2004 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, PROCEEDINGS, 2004, : 136 - 136
  • [28] Quantum key distribution: Security, feasibility and robustness
    Wang, Xiang-Bin
    QUANTUM COMPUTATION AND INFORMATION: FROM THEORY TO EXPERIMENT, 2006, 102 : 185 - 233
  • [29] Upgrading PPP security by quantum key distribution
    Ghernaouti-Helie, Solange
    Sfaxi, Mohamed Ali
    NETWORK CONTROL AND ENGINEERING FOR QOS, SECURITY AND MOBILITY, IV, 2007, 229 : 45 - +
  • [30] Security of "asymmetrical quantum key distribution protocol"
    Li, Chuan-Ming
    Hwang, Tzonelih
    Lee, Kuo-Chang
    INTERNATIONAL JOURNAL OF MODERN PHYSICS C, 2007, 18 (02): : 157 - 161