Practical issues of twin-field quantum key distribution

Twin-Field Quantum Key Distribution(TF-QKD) protocol and its variants, such as Phase-Matching QKD(PM-QKD), sending or not QKD(SNS-QKD) and No Phase Post-Selection TF-QKD(NPP-TFQKD), are very promising for long-distance applications. However, there are still some gaps between theory and practice in these protocols. Concretely, a finite-key size analysis is still missing, and the intensity fluctuations are not taken into account. To address the finite-key size effect, we first give the key rate of NPP-TFQKD against collective attack in finite-key size region and then prove it can be against coherent attack. To deal with the intensity fluctuations, we present an analytical formula of 4-intensity decoy state NPP-TFQKD and a practical intensity fluctuation model. Finally, through detailed simulations, we show NPP-TFQKD can still keep its superiority of high key rate and long achievable distance.

[1]  S. Guha,et al.  Fundamental rate-loss tradeoff for optical quantum key distribution , 2014, Nature Communications.

[2]  Hoi-Kwong Lo,et al.  Simple security proof of twin-field type quantum key distribution protocol , 2018, npj Quantum Information.

[3]  Dominic Mayers,et al.  Unconditional security in quantum cryptography , 1998, JACM.

[4]  Qiang Zhang,et al.  Experimental Twin-Field Quantum Key Distribution Through Sending-or-Not-Sending , 2019, Physical review letters.

[5]  Xiongfeng Ma,et al.  Phase-Matching Quantum Key Distribution , 2018, Physical Review X.

[6]  J. F. Dynes,et al.  Overcoming the rate–distance limit of quantum key distribution without quantum repeaters , 2018, Nature.

[7]  Xingyu Zhou,et al.  Asymmetric sending or not sending twin-field quantum key distribution in practice , 2019, Physical Review A.

[8]  Masato Koashi,et al.  Simple security proof of quantum key distribution based on complementarity , 2009 .

[9]  Ekert,et al.  Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.

[10]  Jie Lin,et al.  Simple security analysis of phase-matching measurement-device-independent quantum key distribution , 2018, Physical Review A.

[11]  Wei Cui,et al.  Finite-key analysis for measurement-device-independent quantum key distribution , 2013, Nature Communications.

[12]  G. Guo,et al.  Measurement-device-independent quantum key distribution robust against environmental disturbances , 2017 .

[13]  Shor,et al.  Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.

[14]  Jianqiang Liu,et al.  Generation of Stable and High Extinction Ratio Light Pulses for Continuous Variable Quantum Key Distribution , 2015, IEEE Journal of Quantum Electronics.

[15]  M. Curty,et al.  Measurement-device-independent quantum key distribution. , 2011, Physical review letters.

[16]  R. Renner,et al.  Uncertainty relation for smooth entropies. , 2010, Physical review letters.

[17]  Jian-Wei Pan,et al.  Measurement-device-independent quantum key distribution over 200 km. , 2014, Physical review letters.

[18]  Li Qian,et al.  Proof-of-Principle Experimental Demonstration of Twin-Field Type Quantum Key Distribution. , 2019, Physical review letters.

[19]  Shuang Wang,et al.  Parameter optimization and real-time calibration of a measurement-device-independent quantum key distribution network based on a back propagation artificial neural network , 2018, Journal of the Optical Society of America B.

[20]  Xiang‐Bin Wang,et al.  Beating the PNS attack in practical quantum cryptography , 2004 .

[21]  Jörn Müller-Quade,et al.  Composability in quantum cryptography , 2009, ArXiv.

[22]  Xiang‐Bin Wang,et al.  Three-intensity decoy-state method for device-independent quantum key distribution with basis-dependent errors , 2012, 1207.0392.

[23]  Xiongfeng Ma,et al.  Alternative schemes for measurement-device-independent quantum key distribution , 2012, 1204.4856.

[24]  Shuang Wang,et al.  Beating the Fundamental Rate-Distance Limit in a Proof-of-Principle Quantum Key Distribution System , 2019, Physical Review X.

[25]  Lo,et al.  Unconditional security of quantum key distribution over arbitrarily long distances , 1999, Science.

[26]  S. Pirandola,et al.  General Benchmarks for Quantum Repeaters , 2015, 1512.04945.

[27]  Kazuoki Azuma WEIGHTED SUMS OF CERTAIN DEPENDENT RANDOM VARIABLES , 1967 .

[28]  R. Eberhart,et al.  Empirical study of particle swarm optimization , 1999, Proceedings of the 1999 Congress on Evolutionary Computation-CEC99 (Cat. No. 99TH8406).

[29]  Gilles Brassard,et al.  Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..

[30]  V. Scarani,et al.  Finite-key security against coherent attacks in quantum key distribution , 2010, 1008.2596.

[31]  Shuang Wang,et al.  Phase-Reference-Free Experiment of Measurement-Device-Independent Quantum Key Distribution. , 2015, Physical review letters.

[32]  Zheng-Fu Han,et al.  Security of counterfactual quantum cryptography , 2010, 1007.3066.

[33]  Masato Koashi,et al.  Repeaterless quantum key distribution with efficient finite-key analysis overcoming the rate-distance limit , 2019, Nature Communications.

[34]  M. Fejer,et al.  Experimental measurement-device-independent quantum key distribution. , 2012, Physical review letters.

[35]  Marco Tomamichel,et al.  Tight finite-key analysis for quantum cryptography , 2011, Nature Communications.

[36]  Chun-Mei Zhang,et al.  Improved statistical fluctuation analysis for measurement-device-independent quantum key distribution , 2012 .

[37]  Marco Lucamarini,et al.  Experimental quantum key distribution beyond the repeaterless secret key capacity , 2019, Nature Photonics.

[38]  Matthias Christandl,et al.  Postselection technique for quantum channels with applications to quantum cryptography. , 2008, Physical review letters.

[39]  Xiang‐Bin Wang,et al.  Statistical fluctuation analysis for measurement-device-independent quantum key distribution with three-intensity decoy-state method , 2014, 1410.3265.

[40]  Rong Wang,et al.  Twin-Field Quantum Key Distribution without Phase Postselection , 2018, Physical Review Applied.

[41]  Qin Wang,et al.  Implementing full parameter optimization on decoy-state measurement-device-independent quantum key distributions under realistic experimental conditions , 2017 .

[42]  Zong-Wen Yu,et al.  Twin-field quantum key distribution with large misalignment error , 2018, Physical Review A.

[43]  J-C Boileau,et al.  Unconditional security of a three state quantum key distribution protocol. , 2004, Physical review letters.

[44]  F. Bussières,et al.  Secure Quantum Key Distribution over 421 km of Optical Fiber. , 2018, Physical review letters.

[45]  Xiongfeng Ma,et al.  Decoy state quantum key distribution. , 2004, Physical review letters.