4.7 Article

Measurement-device-independent quantum key distribution with leaky sources

期刊

SCIENTIFIC REPORTS
卷 11, 期 1, 页码 -

出版社

NATURE PORTFOLIO
DOI: 10.1038/s41598-021-81003-2

关键词

-

资金

  1. Galician Regional Government, consolidation of Research Units: AtlantTIC
  2. Spanish Ministry of Economy and Competitiveness (MINECO)
  3. Fondo Europeo de Desarrollo Regional (FEDER) [TEC2017-88243-R]
  4. European Union's Horizon 2020 research and innovation programme under the Marie Sklodowska-Currie Grant [675662]
  5. National Natural Science Foundation of China [61701539, 61972413, 61901525]
  6. National Cryptography Development Fund [mmjj20180107, mmjj20180212]
  7. JSPS KAKENHI [JP18H05237, 18H05237]
  8. JST-CREST [JPMJCR 1671]

向作者/读者索取更多资源

This study presents a general formalism to prove the security of MDI-QKD with leaky sources. By analyzing the finite-key security of different MDI-QKD schemes, it is shown that MDI-QKD is feasible as long as the sources are sufficiently isolated.
Measurement-device-independent quantum key distribution (MDI-QKD) can remove all detection side-channels from quantum communication systems. The security proofs require, however, that certain assumptions on the sources are satisfied. This includes, for instance, the requirement that there is no information leakage from the transmitters of the senders, which unfortunately is very difficult to guarantee in practice. In this paper we relax this unrealistic assumption by presenting a general formalism to prove the security of MDI-QKD with leaky sources. With this formalism, we analyze the finite-key security of two prominent MDI-QKD schemes-a symmetric three-intensity decoy-state MDI-QKD protocol and a four-intensity decoy-state MDI-QKD protocol-and determine their robustness against information leakage from both the intensity modulator and the phase modulator of the transmitters. Our work shows that MDI-QKD is feasible within a reasonable time frame of signal transmission given that the sources are sufficiently isolated. Thus, it provides an essential reference for experimentalists to ensure the security of implementations of MDI-QKD in the presence of information leakage.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据