Unconditional Security of Sending or Not Sending Twin-Field Quantum Key Distribution with Finite Pulses

The Sending-or-Not-Sending protocol of the twin-field quantum key distribution (TF-QKD) has its advantage of unconditional security proof under any coherent attack and fault tolerance to large misalignment error. So far this is the only coherent-state based TF-QKD protocol that has considered finite-key effect, the statistical fluctuations. Here we consider the complete finite-key effects for the protocol and we show by numerical simulation that the protocol with typical finite number of pulses in practice can produce unconditional secure final key under general attack, including all coherent attacks. It can exceed the secure distance of 500 $km$ in typical finite number of pulses in practice even with a large misalignment error.

[1]  N. Lütkenhaus Security against individual attacks for realistic quantum key distribution , 2000 .

[2]  Xiongfeng Ma,et al.  Phase-Matching Quantum Key Distribution , 2018, Physical Review X.

[3]  Wei Chen,et al.  Experimental demonstration of counteracting imperfect sources in a practical one-way quantum-key-distribution system , 2009 .

[4]  M. Curty,et al.  Measurement-device-independent quantum key distribution. , 2011, Physical review letters.

[5]  Xiang‐Bin Wang,et al.  Statistical fluctuation analysis for measurement-device-independent quantum key distribution with three-intensity decoy-state method , 2014, 1410.3265.

[6]  S. Guha,et al.  Fundamental rate-loss tradeoff for optical quantum key distribution , 2014, Nature Communications.

[7]  Zong-Wen Yu,et al.  Twin-field quantum key distribution with large misalignment error , 2018, Physical Review A.

[8]  Christian Kurtsiefer,et al.  Full-field implementation of a perfect eavesdropper on a quantum cryptography system. , 2010, Nature communications.

[9]  Rong Wang,et al.  Twin-Field Quantum Key Distribution without Phase Postselection , 2018, Physical Review Applied.

[10]  Marco Tomamichel,et al.  Duality Between Smooth Min- and Max-Entropies , 2009, IEEE Transactions on Information Theory.

[11]  Masato Koashi,et al.  Unconditionally secure key distribution based on two nonorthogonal states. , 2003, Physical review letters.

[12]  Yoshihisa Yamamoto,et al.  Practical quantum key distribution protocol without monitoring signal disturbance , 2014, Nature.

[13]  Marco Tomamichel,et al.  Tight finite-key analysis for quantum cryptography , 2011, Nature Communications.

[14]  James F. Dynes,et al.  A quantum access network , 2013, Nature.

[15]  A R Dixon,et al.  Field test of quantum key distribution in the Tokyo QKD Network. , 2011, Optics express.

[16]  Jian-Wei Pan,et al.  Measurement-device-independent quantum key distribution over 200 km. , 2014, Physical review letters.

[17]  Masato Koashi,et al.  Simple and efficient quantum key distribution with parametric down-conversion. , 2007, Physical review letters.

[18]  Marco Lucamarini,et al.  Experimental quantum key distribution beyond the repeaterless secret key capacity , 2019, Nature Photonics.

[19]  Hai Xu,et al.  qu an tph ] 2 5 Ju l 2 01 8 Sending-or-not twin-field quantum key distribution in practice , 2018 .

[20]  Masato Koashi,et al.  Simple security proof of quantum key distribution based on complementarity , 2009 .

[21]  Li Qian,et al.  Experimental demonstration of polarization encoding measurement-device-independent quantum key distribution. , 2013, Physical review letters.

[22]  H. Weinfurter,et al.  The SECOQC quantum key distribution network in Vienna , 2009, 2009 35th European Conference on Optical Communication.

[23]  M. Fejer,et al.  Experimental measurement-device-independent quantum key distribution. , 2012, Physical review letters.

[24]  H. Bechmann-Pasquinucci,et al.  Quantum cryptography , 2001, quant-ph/0101098.

[25]  V. Scarani,et al.  The security of practical quantum key distribution , 2008, 0802.4155.

[26]  Ueli Maurer,et al.  Small accessible quantum information does not imply security. , 2007, Physical review letters.

[27]  F. Bussières,et al.  Secure Quantum Key Distribution over 421 km of Optical Fiber. , 2018, Physical review letters.

[28]  Masato Koashi,et al.  Experimental quantum key distribution without monitoring signal disturbance , 2015, Nature Photonics.

[29]  Xiang‐Bin Wang,et al.  Beating the PNS attack in practical quantum cryptography , 2004 .

[30]  Renato Renner,et al.  Quantum cryptography with finite resources: unconditional security bound for discrete-variable protocols with one-way postprocessing. , 2007, Physical review letters.

[31]  Jian-Wei Pan,et al.  Decoy-state quantum key distribution with both source errors and statistical fluctuations , 2009, 0902.4660.

[32]  H. Weinfurter,et al.  Experimental Demonstration of Free-Space Decoy-State Quantum Key Distribution over 144 km , 2007, 2007 European Conference on Lasers and Electro-Optics and the International Quantum Electronics Conference.

[33]  Xiang-Bin Wang A decoy-state protocol for quantum cryptography with 4 intensities of coherent states , 2008 .

[34]  Y.-H. Zhou,et al.  Making the decoy-state measurement-device-independent quantum key distribution practically useful , 2015, 1502.01262.

[35]  Hui Liu,et al.  Measurement-Device-Independent Quantum Key Distribution Over a 404 km Optical Fiber. , 2016, Physical review letters.

[36]  Wei Cui,et al.  Finite-key analysis for measurement-device-independent quantum key distribution , 2013, Nature Communications.

[37]  Tao Zhang,et al.  Experimental decoy-state quantum key distribution with a sub-poissionian heralded single-photon source. , 2008, Physical review letters.

[38]  Shuang Wang,et al.  Beating the Fundamental Rate-Distance Limit in a Proof-of-Principle Quantum Key Distribution System , 2019, Physical Review X.

[39]  Xiongfeng Ma,et al.  Decoy state quantum key distribution. , 2004, Physical review letters.

[40]  B Kraus,et al.  Lower and upper bounds on the secret-key rate for quantum key distribution protocols using one-way classical communication. , 2004, Physical review letters.

[41]  Kai Chen,et al.  Metropolitan all-pass and inter-city quantum communication network. , 2010, Optics express.

[42]  R. Renner,et al.  Uncertainty relation for smooth entropies. , 2010, Physical review letters.

[43]  Cheng-Zhi Peng,et al.  Simple protocol for secure decoy-state quantum key distribution with a loosely controlled source , 2007 .

[44]  N. Lutkenhaus,et al.  Quantum key distribution with realistic states: photon-number statistics in the photon-number splitting attack , 2001, quant-ph/0112147.

[45]  Xingyu Zhou,et al.  Asymmetric sending or not sending twin-field quantum key distribution in practice , 2019, Physical Review A.

[46]  Sanders,et al.  Limitations on practical quantum cryptography , 2000, Physical review letters.

[47]  Marco Tomamichel,et al.  Chain Rules for Smooth Min- and Max-Entropies , 2012, IEEE Transactions on Information Theory.

[48]  C. G. Peterson,et al.  Long-distance decoy-state quantum key distribution in optical fiber. , 2006, Physical review letters.

[49]  Jörn Müller-Quade,et al.  Composability in quantum cryptography , 2009, ArXiv.

[50]  Shuang Wang,et al.  Phase-Reference-Free Experiment of Measurement-Device-Independent Quantum Key Distribution. , 2015, Physical review letters.

[51]  Nicolas Gisin,et al.  Quantum communication , 2017, 2017 Optical Fiber Communications Conference and Exhibition (OFC).

[52]  Xiang‐Bin Wang,et al.  Reexamination of decoy-state quantum key distribution with biased bases , 2016 .

[53]  G. Guo,et al.  Measurement-device-independent quantum key distribution robust against environmental disturbances , 2017 .

[54]  Feihu Xu,et al.  Protocol choice and parameter optimization in decoy-state measurement-device-independent quantum key distribution , 2014, 1406.0188.

[55]  Won-Young Hwang Quantum key distribution with high loss: toward global secure communication. , 2003, Physical review letters.

[56]  I Lucio-Martinez,et al.  Real-world two-photon interference and proof-of-principle quantum key distribution immune to detector attacks. , 2013, Physical review letters.

[57]  H. Chernoff A Measure of Asymptotic Efficiency for Tests of a Hypothesis Based on the sum of Observations , 1952 .

[58]  Xiang‐Bin Wang,et al.  Three-intensity decoy-state method for device-independent quantum key distribution with basis-dependent errors , 2012, 1207.0392.

[59]  J. Skaar,et al.  Hacking commercial quantum cryptography systems by tailored bright illumination , 2010, 1008.4593.

[60]  M. Hayashi,et al.  Quantum information with Gaussian states , 2007, 0801.4604.

[61]  Horace P. Yuen,et al.  Quantum amplifiers, quantum duplicators and quantum cryptography , 1996 .

[62]  Cong Jiang,et al.  Measurement-device-independent quantum key distribution with source state errors and statistical fluctuation , 2017, 1710.08211.

[63]  J. F. Dynes,et al.  Overcoming the rate–distance limit of quantum key distribution without quantum repeaters , 2018, Nature.

[64]  Marcos Curty,et al.  Practical decoy-state method for twin-field quantum key distribution , 2019, New Journal of Physics.

[65]  Stefano Pirandola,et al.  Side-channel-free quantum key distribution. , 2011, Physical review letters.

[66]  Jian-Wei Pan,et al.  Experimental long-distance decoy-state quantum key distribution based on polarization encoding. , 2006, Physical review letters.

[67]  Gisin,et al.  Quantum cryptography with coherent states. , 1995, Physical review. A, Atomic, molecular, and optical physics.

[68]  H. Chau Decoy-state quantum key distribution with more than three types of photon intensity pulses , 2017, 1712.00727.

[69]  J. F. Dynes,et al.  Overcoming the rate-distance barrier of quantum key distribution without using quantum repeaters , 2018 .

[70]  Hai Xu,et al.  Sending-or-not-sending twin-field quantum key distribution in practice , 2018, Scientific Reports.

[71]  Chun-Mei Zhang,et al.  Twin-field quantum key distribution with modified coherent states. , 2019, Optics letters.

[72]  Yongmei Huang,et al.  Satellite-to-ground quantum key distribution , 2017, Nature.

[73]  M. Hayashi Upper bounds of eavesdropper’s performances in finite-length code with the decoy method , 2007, quant-ph/0702250.

[74]  L. Banchi,et al.  Fundamental limits of repeaterless quantum communications , 2015, Nature Communications.

[75]  R. Penty,et al.  Quantum key distribution without detector vulnerabilities using optically seeded lasers , 2015, Nature Photonics.

[76]  Jian-Wei Pan,et al.  General theory of decoy-state quantum cryptography with source errors , 2006, quant-ph/0612121.

[77]  Shor,et al.  Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.

[78]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[79]  Hoi-Kwong Lo,et al.  Loss-tolerant quantum cryptography with imperfect sources , 2013, 1312.3514.