Measurement-device-independent quantum key distribution with leaky sources
Abstract Measurement-device-independent quantum key distribution (MDI-QKD) can remove all detection side-channels from quantum communication systems. The security proofs require, however, that certain assumptions on the sources are satisfied. This includes, for instance, the requirement that there i...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Nature Publishing Group
2021-01-01
|
Series: | Scientific Reports |
Online Access: | https://doi.org/10.1038/s41598-021-81003-2 |
id |
doaj-72f35afdef8d4656823bfdd5f3802586 |
---|---|
record_format |
Article |
spelling |
doaj-72f35afdef8d4656823bfdd5f38025862021-01-24T12:31:00ZengNature Publishing GroupScientific Reports2045-23222021-01-0111111110.1038/s41598-021-81003-2Measurement-device-independent quantum key distribution with leaky sourcesWeilong Wang0Kiyoshi Tamaki1Marcos Curty2EI Telecomunicación, Department of Signal Theory and Communications, University of VigoFaculty of Engineering, University of ToyamaEI Telecomunicación, Department of Signal Theory and Communications, University of VigoAbstract Measurement-device-independent quantum key distribution (MDI-QKD) can remove all detection side-channels from quantum communication systems. The security proofs require, however, that certain assumptions on the sources are satisfied. This includes, for instance, the requirement that there is no information leakage from the transmitters of the senders, which unfortunately is very difficult to guarantee in practice. In this paper we relax this unrealistic assumption by presenting a general formalism to prove the security of MDI-QKD with leaky sources. With this formalism, we analyze the finite-key security of two prominent MDI-QKD schemes—a symmetric three-intensity decoy-state MDI-QKD protocol and a four-intensity decoy-state MDI-QKD protocol—and determine their robustness against information leakage from both the intensity modulator and the phase modulator of the transmitters. Our work shows that MDI-QKD is feasible within a reasonable time frame of signal transmission given that the sources are sufficiently isolated. Thus, it provides an essential reference for experimentalists to ensure the security of implementations of MDI-QKD in the presence of information leakage.https://doi.org/10.1038/s41598-021-81003-2 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Weilong Wang Kiyoshi Tamaki Marcos Curty |
spellingShingle |
Weilong Wang Kiyoshi Tamaki Marcos Curty Measurement-device-independent quantum key distribution with leaky sources Scientific Reports |
author_facet |
Weilong Wang Kiyoshi Tamaki Marcos Curty |
author_sort |
Weilong Wang |
title |
Measurement-device-independent quantum key distribution with leaky sources |
title_short |
Measurement-device-independent quantum key distribution with leaky sources |
title_full |
Measurement-device-independent quantum key distribution with leaky sources |
title_fullStr |
Measurement-device-independent quantum key distribution with leaky sources |
title_full_unstemmed |
Measurement-device-independent quantum key distribution with leaky sources |
title_sort |
measurement-device-independent quantum key distribution with leaky sources |
publisher |
Nature Publishing Group |
series |
Scientific Reports |
issn |
2045-2322 |
publishDate |
2021-01-01 |
description |
Abstract Measurement-device-independent quantum key distribution (MDI-QKD) can remove all detection side-channels from quantum communication systems. The security proofs require, however, that certain assumptions on the sources are satisfied. This includes, for instance, the requirement that there is no information leakage from the transmitters of the senders, which unfortunately is very difficult to guarantee in practice. In this paper we relax this unrealistic assumption by presenting a general formalism to prove the security of MDI-QKD with leaky sources. With this formalism, we analyze the finite-key security of two prominent MDI-QKD schemes—a symmetric three-intensity decoy-state MDI-QKD protocol and a four-intensity decoy-state MDI-QKD protocol—and determine their robustness against information leakage from both the intensity modulator and the phase modulator of the transmitters. Our work shows that MDI-QKD is feasible within a reasonable time frame of signal transmission given that the sources are sufficiently isolated. Thus, it provides an essential reference for experimentalists to ensure the security of implementations of MDI-QKD in the presence of information leakage. |
url |
https://doi.org/10.1038/s41598-021-81003-2 |
work_keys_str_mv |
AT weilongwang measurementdeviceindependentquantumkeydistributionwithleakysources AT kiyoshitamaki measurementdeviceindependentquantumkeydistributionwithleakysources AT marcoscurty measurementdeviceindependentquantumkeydistributionwithleakysources |
_version_ |
1724325687905484800 |