High-dimensional measurement-device-independent quantum key distribution on two-dimensional subspaces

Quantum key distribution (QKD) provides ultimate cryptographic security based on the laws of quantum mechanics. For point-to-point QKD protocols, the security of the generated key is compromised by detector side channel attacks. This problem can be solved with measurement-device-independent QKD (mdi-QKD). However, mdi-QKD has shown limited performances in terms of the secret key generation rate, due to postselection in the Bell measurements. We show that high-dimensional (Hi-D) encoding (qudits) improves the performance of current mdi-QKD implementations. The scheme is proven to be unconditionally secure even for weak coherent pulses with decoy states, while the secret key rate is derived in the single-photon case. Our analysis includes phase errors, imperfect sources, and dark counts to mimic real systems. Compared to the standard bidimensional case, we show an improvement in the key generation rate.

[1]  Yonggi Jo,et al.  Key-rate enhancement using qutrit states for quantum key distribution with askew aligned sources , 2016 .

[2]  Sibasish Ghosh,et al.  Qudit-Teleportation for photons with linear optics , 2012, Scientific Reports.

[3]  Zach DeVito,et al.  Opt , 2017 .

[4]  L. Vaidman,et al.  Methods for Reliable Teleportation , 1998, quant-ph/9808040.

[5]  D. Englund,et al.  Photon-efficient quantum key distribution using time–energy entanglement with high-dimensional encoding , 2015 .

[6]  J. Skaar,et al.  Hacking commercial quantum cryptography systems by tailored bright illumination , 2010, 1008.4593.

[7]  Feihu Xu,et al.  Experimental demonstration of phase-remapping attack in a practical quantum key distribution system , 2010, 1005.2376.

[8]  R. Rosenfeld Nature , 2009, Otolaryngology--head and neck surgery : official journal of American Academy of Otolaryngology-Head and Neck Surgery.

[9]  이기복 18 , 2000, Testament d'un patriote exécuté.

[10]  Shor,et al.  Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.

[11]  Discrimination of the Bell states of qudits by means of linear optics , 2001, quant-ph/0107119.

[12]  M. Curty,et al.  Measurement-device-independent quantum key distribution. , 2011, Physical review letters.

[13]  M. E. Cox Handbook of Optics , 1980 .

[14]  Lo,et al.  Unconditional security of quantum key distribution over arbitrarily long distances , 1999, Science.

[15]  J. Skaar,et al.  After-gate attack on a quantum cryptosystem , 2010, 1009.2683.

[16]  J. Skaar,et al.  Thermal blinding of gated detectors in quantum cryptography. , 2010, Optics express.

[17]  Masato Koashi,et al.  Simple security proof of quantum key distribution based on complementarity , 2009 .

[18]  Leif Katsuo Oxenløwe,et al.  High-dimensional quantum key distribution based on multicore fiber using silicon photonic integrated circuits , 2016, npj Quantum Information.

[19]  L. Goddard Information Theory , 1962, Nature.

[20]  Christine Chen,et al.  Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems , 2007, 0704.3253.

[21]  K. K. Nambiar,et al.  Foundations of Computer Science , 2001, Lecture Notes in Computer Science.

[22]  J. F. Dynes,et al.  Overcoming the rate–distance limit of quantum key distribution without quantum repeaters , 2018, Nature.

[23]  Dirk Englund,et al.  Unconditional security of time-energy entanglement quantum key distribution using dual-basis interferometry. , 2013, Physical review letters.

[24]  Wei Cui,et al.  Finite-key analysis for measurement-device-independent quantum key distribution , 2013, Nature Communications.

[25]  Daniel J Gauthier,et al.  Provably secure and high-rate quantum key distribution with time-bin qudits , 2017, Science Advances.

[26]  V. Scarani,et al.  Device-independent security of quantum cryptography against collective attacks. , 2007, Physical review letters.

[27]  Leif Katsuo Oxenløwe,et al.  Two-dimensional distributed-phase-reference protocol for quantum key distribution , 2016, Scientific Reports.

[28]  John Calsamiglia Generalized measurements by linear elements , 2002 .

[29]  M. Fejer,et al.  Experimental measurement-device-independent quantum key distribution. , 2012, Physical review letters.

[30]  Antonio-José Almeida,et al.  NAT , 2019, Springer Reference Medizin.

[31]  Stefano Pirandola,et al.  Side-channel-free quantum key distribution. , 2011, Physical review letters.

[32]  Thierry Paul,et al.  Quantum computation and quantum information , 2007, Mathematical Structures in Computer Science.

[33]  Xiongfeng Ma,et al.  Decoy state quantum key distribution. , 2004, Physical review letters.

[34]  Won-Young Hwang Quantum key distribution with high loss: toward global secure communication. , 2003, Physical review letters.

[35]  J. Skaar,et al.  Controlling a superconducting nanowire single-photon detector using tailored bright illumination , 2011, 1106.2396.

[36]  Hitoshi Inamori,et al.  Security of Practical Time-Reversed EPR Quantum Key Distribution , 2002, Algorithmica.

[37]  Hoi-Kwong Lo,et al.  Phase-Remapping Attack in Practical Quantum Key Distribution Systems , 2006, ArXiv.

[38]  J. Skaar,et al.  Tailored bright illumination attack on distributed-phase-reference protocols , 2010, 1012.4366.

[39]  Hoi-Kwong Lo,et al.  Efficient Quantum Key Distribution Scheme and a Proof of Its Unconditional Security , 2004, Journal of Cryptology.

[40]  Shihan Sajeed,et al.  Attacks exploiting deviation of mean photon number in quantum key distribution and coin-tossing , 2014, ArXiv.

[41]  Xiang‐Bin Wang,et al.  Beating the PNS attack in practical quantum cryptography , 2004 .