Security of quantum key distribution with intensity correlations

被引:25
|
作者
Zapatero, Victor [1 ]
Navarrete, Alvaro [1 ]
Tamaki, Kiyoshi [2 ]
Curty, Marcos [1 ]
机构
[1] Univ Vigo, Dept Signal Theory & Commun, Escuela Ingn Telecomunicac, E-36310 Vigo, Spain
[2] Univ Toyama, Fac Engn, Gofuku 3190, Toyama 9308555, Japan
来源
QUANTUM | 2021年 / 5卷
关键词
PROBABILITY-INEQUALITIES;
D O I
10.22331/q-2021-12-07-602
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
The decoy-state method in quantum key distribution (QKD) is a popular technique to approximately achieve the performance of ideal single-photon sources by means of simpler and practical laser sources. In high-speed decoystate QKD systems, however, intensity correlations between succeeding pulses leak information about the users' intensity settings, thus invalidating a key assumption of this approach. Here, we solve this pressing problem by developing a general technique to incorporate arbitrary intensity correlations to the security analysis of decoy-state QKD. This technique only requires to experimentally quantify two main parameters: the correlation range and the maximum relative deviation between the selected and the actually emitted intensities. As a side contribution, we provide a non-standard derivation of the asymptotic secret key rate formula from the non-asymptotic one, in so revealing a necessary condition for the significance of the former.
引用
收藏
页码:1 / 27
页数:27
相关论文
共 50 条
  • [41] Finite-key security of passive quantum key distribution
    Zapatero, Victor
    Curty, Marcos
    PHYSICAL REVIEW APPLIED, 2024, 21 (01)
  • [42] Countermeasure for security loophole caused by asymmetric correlations of reference frame independent quantum key distribution with fewer quantum states
    Lim, Kyongchun
    Choi, Byung-Seok
    Baek, Ju Hee
    Kim, Minchul
    Choe, Joong-Seon
    Kim, Kap-Joong
    Ko, Young-Ho
    Youn, Chun Ju
    OPTICS EXPRESS, 2021, 29 (12) : 18966 - 18975
  • [43] SECURITY IN QUANTUM COMPUTING USING QUANTUM KEY DISTRIBUTION PROTOCOLS
    Kartheek, D. N.
    Amarnath, G.
    Reddy, P. Venkateswarlu
    2013 IEEE INTERNATIONAL MULTI CONFERENCE ON AUTOMATION, COMPUTING, COMMUNICATION, CONTROL AND COMPRESSED SENSING (IMAC4S), 2013, : 19 - 24
  • [44] Finite-key security analysis for multilevel quantum key distribution
    Bradler, Kamil
    Mirhosseini, Mohammad
    Fickler, Robert
    Broadbent, Anne
    Boyd, Robert
    NEW JOURNAL OF PHYSICS, 2016, 18
  • [46] Directly intensity-modulated quantum key distribution
    Roberts, George L.
    Lucamarini, Marco
    Dynes, James F.
    Savory, Seb J.
    Yuan, Zhiliang
    Shields, Andrew J.
    2017 CONFERENCE ON LASERS AND ELECTRO-OPTICS (CLEO), 2017,
  • [47] Estimating security of the quantum key distribution from the guesswork
    Li, Hong-Wei
    Shi, Jian-Hong
    Cai, Qing-Yu
    Sun, Chang-Pu
    QUANTUM INFORMATION PROCESSING, 2022, 21 (04)
  • [48] Practical Security of Semi-Quantum Key Distribution
    Krawec, Walter O.
    QUANTUM INFORMATION SCIENCE, SENSING, AND COMPUTATION X, 2018, 10660
  • [49] Security of quantum key distribution with imperfect phase randomisation
    Curras-Lorenzo, Guillermo
    Nahar, Shlok
    Lutkenhaus, Norbert
    Tamaki, Kiyoshi
    Curty, Marcos
    QUANTUM SCIENCE AND TECHNOLOGY, 2024, 9 (01)
  • [50] Incompleteness and Limit of Security Theory of Quantum Key Distribution
    Hirota, Osamu
    Murakami, Dan
    Kato, Kentaro
    Futami, Fumio
    QUANTUM COMMUNICATIONS AND QUANTUM IMAGING X, 2012, 8518