Source attack of decoy-state quantum key distribution using phase information