期刊
SCIENCE BULLETIN
卷 67, 期 21, 页码 2167-2175出版社
ELSEVIER
DOI: 10.1016/j.scib.2022.10.010
关键词
Measurement-device-independent; Quantum key distribution; Reference technique; Source flaw characterization; Practical security
资金
- Natural Science Foundation of Jiangsu Province [BK20211145]
- Fundamental Research Funds for the Central Universities [020414380182]
- Key Research and Development Program of Nanjing Jiangbei New Aera [ZDYD20210101]
- Program for Innovative Talents and Entrepreneurs in Jiangsu [JSSCRC2021484]
This study presents the adoption of the reference technique to demonstrate the security of an efficient four-phase measurement-device-independent QKD using laser pulses against potential source imperfections. Through characterization of source flaws, connection with experiments, and finite-key analysis against coherent attacks, the feasibility of the protocol is demonstrated, achieving a high secure key rate under channel loss.
The security of quantum key distribution (QKD) is severely threatened by discrepancies between realistic devices and theoretical assumptions. Recently, a significant framework called the reference technique was proposed to provide security against arbitrary source flaws under current technology such as state preparation flaws, side channels caused by mode dependencies, the Trojan horse attacks and pulse correlations. Here, we adopt the reference technique to prove security of an efficient four-phase measurement-device-independent QKD using laser pulses against potential source imperfections. We present a characterization of source flaws and connect them to experiments, together with a finite-key analysis against coherent attacks. In addition, we demonstrate the feasibility of our protocol through a proof-of-principle experimental implementation and achieve a secure key rate of 253 bps with a 20 dB channel loss. Compared with previous QKD protocols with imperfect devices, our study considerably improves both the secure key rate and the transmission distance, and shows application potential in the practical deployment of secure QKD with device imperfections. (c) 2022 Science China Press. Published by Elsevier B.V. and Science China Press.
作者
我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。
推荐
暂无数据