Practical passive decoy state measurement-device-independent quantum key distribution with unstable sources

Measurement-device-independent quantum key distribution (MDI-QKD) with the active decoy state method can remove all detector loopholes, and resist the imperfections of sources. But it may lead to side channel attacks and break the security of QKD system. In this paper, we apply the passive decoy state method to the MDI-QKD based on polarization encoding mode. Not only all attacks on detectors can be removed, but also the side channel attacks on sources can be overcome. We get that the MDI-QKD with our passive decoy state method can have a performance comparable to the protocol with the active decoy state method. To fit for the demand of practical application, we discuss intensity fluctuation in the security analysis of MDI-QKD protocol using passive decoy state method, and derive the key generation rate for our protocol with intensity fluctuation. It shows that intensity fluctuation has an adverse effect on the key generation rate which is non-negligible, especially in the case of small data size of total transmitting signals and long distance transmission. We give specific simulations on the relationship between intensity fluctuation and the key generation rate. Furthermore, the statistical fluctuation due to the finite length of data is also taken into account.

[1]  Xiongfeng Ma,et al.  Decoy state quantum key distribution. , 2004, Physical review letters.

[2]  Yang Wang,et al.  Passive decoy-state quantum key distribution using weak coherent pulses with intensity fluctuations , 2013, 1312.7383.

[3]  H. Weinfurter,et al.  Free-Space distribution of entanglement and single photons over 144 km , 2006, quant-ph/0607182.

[4]  Xiongfeng Ma,et al.  Alternative schemes for measurement-device-independent quantum key distribution , 2012, 1204.4856.

[5]  John Preskill,et al.  Security of quantum key distribution with imperfect devices , 2002, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..

[6]  Xiongfeng Ma,et al.  Statistical fluctuation analysis for measurement-device-independent quantum key distribution , 2012, 1210.3929.

[7]  N. Gisin,et al.  Quantum key distribution over 67 km with a plug , 2002 .

[8]  Y.-H. Zhou,et al.  Making the decoy-state measurement-device-independent quantum key distribution practically useful , 2015, 1502.01262.

[9]  M. Fejer,et al.  Experimental measurement-device-independent quantum key distribution. , 2012, Physical review letters.

[10]  Ting-Ting Song,et al.  Finite-key security analyses on passive decoy-state QKD protocols with different unstable sources , 2015, Scientific Reports.

[11]  T. F. D. Silva,et al.  Proof-of-principle demonstration of measurement-device-independent quantum key distribution using polarization qubits , 2012, 1207.6345.

[12]  Feihu Xu,et al.  Practical aspects of measurement-device-independent quantum key distribution , 2013, 1305.6965.

[13]  L. Liang,et al.  Measurement-device-independent quantum key distribution with a passive decoy-state method , 2014 .

[14]  Chun-Yan Li,et al.  Practical decoy-state measurement-device-independent quantum key distribution , 2013, 1305.7396.

[15]  Qiaoyan Wen,et al.  Eavesdropping on secure deterministic communication with qubits through photon-number-splitting attacks , 2009 .

[16]  T. Moroder,et al.  Passive decoy-state quantum key distribution with practical light sources , 2009, 0911.2815.

[17]  H. Lo,et al.  Quantum key distribution with triggering parametric down-conversion sources , 2008, 0803.2543.

[18]  Li Qian,et al.  Experimental demonstration of polarization encoding measurement-device-independent quantum key distribution. , 2013, Physical review letters.

[19]  T. Moroder,et al.  Non-Poissonian statistics from Poissonian light sources with application to passive decoy state quantum key distribution. , 2009, Optics letters.

[20]  H. Lo,et al.  Practical Decoy State for Quantum Key Distribution , 2005, quant-ph/0503005.

[21]  Zheng-Fu Han,et al.  Decoy-state theory for the heralded single-photon source with intensity fluctuations , 2009 .

[22]  H. Weinfurter,et al.  Entanglement-based quantum communication over 144km , 2007 .

[23]  C. Silberhorn,et al.  Quantum key distribution with passive decoy state selection , 2007 .

[24]  M. Curty,et al.  Measurement-device-independent quantum key distribution. , 2011, Physical review letters.

[25]  Nicolas Gisin,et al.  Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations. , 2004, Physical review letters.

[26]  Chun-Mei Zhang,et al.  Improved statistical fluctuation analysis for measurement-device-independent quantum key distribution , 2012 .

[27]  Wan-Su Bao,et al.  Biased decoy-state measurement-device-independent quantum key distribution with finite resources , 2015 .

[28]  Feihu Xu,et al.  Protocol choice and parameter optimization in decoy-state measurement-device-independent quantum key distribution , 2014, 1406.0188.

[29]  I Lucio-Martinez,et al.  Real-world two-photon interference and proof-of-principle quantum key distribution immune to detector attacks. , 2013, Physical review letters.

[30]  Sanders,et al.  Limitations on practical quantum cryptography , 2000, Physical review letters.

[31]  Xiang‐Bin Wang,et al.  Three-intensity decoy-state method for device-independent quantum key distribution with basis-dependent errors , 2012, 1207.0392.

[32]  Lo,et al.  Unconditional security of quantum key distribution over arbitrarily long distances , 1999, Science.

[33]  Xiang‐Bin Wang,et al.  Reexamination of the decoy-state quantum key distribution with an unstable source , 2010 .

[34]  Xiang-bin Wang,et al.  Decoy state method for measurement device independent quantum key distribution with different intensities in only one basis , 2013, 1309.0471.

[35]  H. Bechmann-Pasquinucci,et al.  Quantum cryptography , 2001, quant-ph/0101098.

[36]  Xiang‐Bin Wang,et al.  Beating the PNS attack in practical quantum cryptography , 2004 .

[37]  Masato Koashi,et al.  Simple and efficient quantum key distribution with parametric down-conversion. , 2007, Physical review letters.

[38]  Gilles Brassard,et al.  Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..

[39]  Fei Gao,et al.  Finite-key analysis for quantum key distribution with decoy states , 2011, Quantum Inf. Comput..

[40]  Qiaoyan Wen,et al.  Finite-key analysis for measurement-device-independent quantum key distribution , 2012 .

[41]  Chun-Yan Li,et al.  Wavelength-selected photon-number-splitting attack against plug-and-play quantum key distribution systems with decoy states , 2012 .

[42]  Shor,et al.  Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.

[43]  Charles H. Bennett,et al.  WITHDRAWN: Quantum cryptography: Public key distribution and coin tossing , 2011 .