Quantum key distribution with simply characterized light sources

To guarantee the security of quantum key distribution (QKD), security proofs of QKD protocols have assumptions on the devices. Commonly used assumptions are, for example, each random bit information chosen by a sender to be precisely encoded on an optical emitted pulse and the photon-number probability distribution of the pulse to be exactly known. These typical assumptions imposed on light sources such as the above two are rather strong and would be hard to verify in practical QKD systems. The goal of the paper is to replace those strong assumptions on the light sources with weaker ones. In this paper, we adopt the differential-phase-shift (DPS) QKD protocol and drastically mitigate the requirements on light sources, while for the measurement unit, trusted and photon-number-resolving detectors are assumed. Specifically, we only assume the independence among emitted pulses, the independence of the vacuum emission probability from a chosen bit, and upper bounds on the tail distribution function of the total photon number in a single block of pulses for single, two and three photons. Remarkably, no other detailed characterizations, such as the amount of phase modulation, are required. Our security proof significantly relaxes demands for light sources, which paves a route to guarantee implementation security with simple verification of the devices.

[1]  Christine Chen,et al.  Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems , 2007, 0704.3253.

[2]  Nobuyuki Imoto,et al.  Robustness of the round-robin differential-phase-shift quantum-key-distribution protocol against source flaws , 2015 .

[3]  Thomas Vidick,et al.  Practical device-independent quantum cryptography via entropy accumulation , 2018, Nature Communications.

[4]  Charles H. Bennett,et al.  Quantum cryptography without Bell's theorem. , 1992, Physical review letters.

[5]  Masato Koashi,et al.  Quantum key distribution with an efficient countermeasure against correlated intensity fluctuations in optical pulses , 2018 .

[6]  Feihu Xu,et al.  Concise security bounds for practical decoy-state quantum key distribution , 2013, 1311.7129.

[7]  J. Skaar,et al.  Hacking commercial quantum cryptography systems by tailored bright illumination , 2010, 1008.4593.

[8]  Shihan Sajeed,et al.  Attacks exploiting deviation of mean photon number in quantum key distribution and coin-tossing , 2014, ArXiv.

[9]  Masato Koashi,et al.  A security proof of the round-robin differential phase shift quantum key distribution protocol based on the signal disturbance , 2017, 1701.08509.

[10]  Bing Qi,et al.  Practical challenges in quantum key distribution , 2016, npj Quantum Information.

[11]  Kazuoki Azuma WEIGHTED SUMS OF CERTAIN DEPENDENT RANDOM VARIABLES , 1967 .

[12]  Xiang‐Bin Wang,et al.  Beating the PNS attack in practical quantum cryptography , 2004 .

[13]  Masato Koashi,et al.  Simple security proof of quantum key distribution based on complementarity , 2009 .

[14]  Shor,et al.  Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.

[15]  Marco Tomamichel,et al.  A largely self-contained and complete security proof for quantum key distribution , 2015, 1506.08458.

[16]  Hoi-Kwong Lo,et al.  Loss-tolerant quantum cryptography with imperfect sources , 2013, 1312.3514.

[17]  N. Gisin,et al.  Trojan-horse attacks on quantum-key-distribution systems (6 pages) , 2005, quant-ph/0507063.

[18]  Toshihiko Sasaki,et al.  Information-theoretic security proof of differential-phase-shift quantum key distribution protocol based on complementarity , 2017 .

[19]  Yoshihisa Yamamoto,et al.  Differential-phase-shift quantum key distribution using coherent light , 2003 .

[20]  Masato Koashi,et al.  Unconditional security of coherent-state-based differential phase shift quantum key distribution protocol with block-wise phase randomization , 2012, 1208.1995.

[21]  Masato Koashi,et al.  Rigorous characterization method for photon-number statistics. , 2019, Optics express.

[22]  Marco Tomamichel,et al.  Tight finite-key analysis for quantum cryptography , 2011, Nature Communications.

[23]  Gilles Brassard,et al.  Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..

[24]  John Preskill,et al.  Secure quantum key distribution with an uncharacterized source. , 2003, Physical review letters.

[25]  Hoi-Kwong Lo,et al.  Effect of source tampering in the security of quantum cryptography , 2015, 1508.05258.

[26]  Hoi-Kwong Lo,et al.  Quantum key distribution with setting-choice-independently correlated light sources , 2018 .

[27]  Zhu Cao,et al.  Discrete-phase-randomized coherent state source and its application in quantum key distribution , 2014, 1410.3217.

[28]  Won-Young Hwang Quantum key distribution with high loss: toward global secure communication. , 2003, Physical review letters.

[29]  M. Curty,et al.  Measurement-device-independent quantum key distribution. , 2011, Physical review letters.

[30]  Christian Kurtsiefer,et al.  Full-field implementation of a perfect eavesdropper on a quantum cryptography system. , 2010, Nature communications.

[31]  Yoshihisa Yamamoto,et al.  Practical quantum key distribution protocol without monitoring signal disturbance , 2014, Nature.

[32]  M. Curty,et al.  Secure quantum key distribution , 2014, Nature Photonics.

[33]  Xiongfeng Ma,et al.  Decoy state quantum key distribution. , 2004, Physical review letters.