4.6 Article

Experimental measurement-device-independent type quantum key distribution with flawed and correlated sources

期刊

SCIENCE BULLETIN
卷 67, 期 21, 页码 2167-2175

出版社

ELSEVIER
DOI: 10.1016/j.scib.2022.10.010

关键词

Measurement-device-independent; Quantum key distribution; Reference technique; Source flaw characterization; Practical security

资金

  1. Natural Science Foundation of Jiangsu Province [BK20211145]
  2. Fundamental Research Funds for the Central Universities [020414380182]
  3. Key Research and Development Program of Nanjing Jiangbei New Aera [ZDYD20210101]
  4. Program for Innovative Talents and Entrepreneurs in Jiangsu [JSSCRC2021484]

向作者/读者索取更多资源

This study presents the adoption of the reference technique to demonstrate the security of an efficient four-phase measurement-device-independent QKD using laser pulses against potential source imperfections. Through characterization of source flaws, connection with experiments, and finite-key analysis against coherent attacks, the feasibility of the protocol is demonstrated, achieving a high secure key rate under channel loss.
The security of quantum key distribution (QKD) is severely threatened by discrepancies between realistic devices and theoretical assumptions. Recently, a significant framework called the reference technique was proposed to provide security against arbitrary source flaws under current technology such as state preparation flaws, side channels caused by mode dependencies, the Trojan horse attacks and pulse correlations. Here, we adopt the reference technique to prove security of an efficient four-phase measurement-device-independent QKD using laser pulses against potential source imperfections. We present a characterization of source flaws and connect them to experiments, together with a finite-key analysis against coherent attacks. In addition, we demonstrate the feasibility of our protocol through a proof-of-principle experimental implementation and achieve a secure key rate of 253 bps with a 20 dB channel loss. Compared with previous QKD protocols with imperfect devices, our study considerably improves both the secure key rate and the transmission distance, and shows application potential in the practical deployment of secure QKD with device imperfections. (c) 2022 Science China Press. Published by Elsevier B.V. and Science China Press.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据