Cargando…
Practical passive decoy state measurement-device-independent quantum key distribution with unstable sources
Measurement-device-independent quantum key distribution (MDI-QKD) with the active decoy state method can remove all detector loopholes, and resist the imperfections of sources. But it may lead to side channel attacks and break the security of QKD system. In this paper, we apply the passive decoy sta...
Autores principales: | , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Nature Publishing Group UK
2017
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5595959/ https://www.ncbi.nlm.nih.gov/pubmed/28900106 http://dx.doi.org/10.1038/s41598-017-09367-y |
_version_ | 1783263452166356992 |
---|---|
author | Liu, Li Guo, Fen-Zhuo Wen, Qiao-Yan |
author_facet | Liu, Li Guo, Fen-Zhuo Wen, Qiao-Yan |
author_sort | Liu, Li |
collection | PubMed |
description | Measurement-device-independent quantum key distribution (MDI-QKD) with the active decoy state method can remove all detector loopholes, and resist the imperfections of sources. But it may lead to side channel attacks and break the security of QKD system. In this paper, we apply the passive decoy state method to the MDI-QKD based on polarization encoding mode. Not only all attacks on detectors can be removed, but also the side channel attacks on sources can be overcome. We get that the MDI-QKD with our passive decoy state method can have a performance comparable to the protocol with the active decoy state method. To fit for the demand of practical application, we discuss intensity fluctuation in the security analysis of MDI-QKD protocol using passive decoy state method, and derive the key generation rate for our protocol with intensity fluctuation. It shows that intensity fluctuation has an adverse effect on the key generation rate which is non-negligible, especially in the case of small data size of total transmitting signals and long distance transmission. We give specific simulations on the relationship between intensity fluctuation and the key generation rate. Furthermore, the statistical fluctuation due to the finite length of data is also taken into account. |
format | Online Article Text |
id | pubmed-5595959 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2017 |
publisher | Nature Publishing Group UK |
record_format | MEDLINE/PubMed |
spelling | pubmed-55959592017-09-15 Practical passive decoy state measurement-device-independent quantum key distribution with unstable sources Liu, Li Guo, Fen-Zhuo Wen, Qiao-Yan Sci Rep Article Measurement-device-independent quantum key distribution (MDI-QKD) with the active decoy state method can remove all detector loopholes, and resist the imperfections of sources. But it may lead to side channel attacks and break the security of QKD system. In this paper, we apply the passive decoy state method to the MDI-QKD based on polarization encoding mode. Not only all attacks on detectors can be removed, but also the side channel attacks on sources can be overcome. We get that the MDI-QKD with our passive decoy state method can have a performance comparable to the protocol with the active decoy state method. To fit for the demand of practical application, we discuss intensity fluctuation in the security analysis of MDI-QKD protocol using passive decoy state method, and derive the key generation rate for our protocol with intensity fluctuation. It shows that intensity fluctuation has an adverse effect on the key generation rate which is non-negligible, especially in the case of small data size of total transmitting signals and long distance transmission. We give specific simulations on the relationship between intensity fluctuation and the key generation rate. Furthermore, the statistical fluctuation due to the finite length of data is also taken into account. Nature Publishing Group UK 2017-09-12 /pmc/articles/PMC5595959/ /pubmed/28900106 http://dx.doi.org/10.1038/s41598-017-09367-y Text en © The Author(s) 2017 Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/. |
spellingShingle | Article Liu, Li Guo, Fen-Zhuo Wen, Qiao-Yan Practical passive decoy state measurement-device-independent quantum key distribution with unstable sources |
title | Practical passive decoy state measurement-device-independent quantum key distribution with unstable sources |
title_full | Practical passive decoy state measurement-device-independent quantum key distribution with unstable sources |
title_fullStr | Practical passive decoy state measurement-device-independent quantum key distribution with unstable sources |
title_full_unstemmed | Practical passive decoy state measurement-device-independent quantum key distribution with unstable sources |
title_short | Practical passive decoy state measurement-device-independent quantum key distribution with unstable sources |
title_sort | practical passive decoy state measurement-device-independent quantum key distribution with unstable sources |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5595959/ https://www.ncbi.nlm.nih.gov/pubmed/28900106 http://dx.doi.org/10.1038/s41598-017-09367-y |
work_keys_str_mv | AT liuli practicalpassivedecoystatemeasurementdeviceindependentquantumkeydistributionwithunstablesources AT guofenzhuo practicalpassivedecoystatemeasurementdeviceindependentquantumkeydistributionwithunstablesources AT wenqiaoyan practicalpassivedecoystatemeasurementdeviceindependentquantumkeydistributionwithunstablesources |