Abstract

Measurement-device-independent quantum key distribution (MDI-QKD) can remove all detection side-channels from quantum communication systems. The security proofs require, however, that certain assumptions on the sources are satisfied. This includes, for instance, the requirement that there is no information leakage from the transmitters of the senders, which unfortunately is very difficult to guarantee in practice. In this paper we relax this unrealistic assumption by presenting a general formalism to prove the security of MDI-QKD with leaky sources. With this formalism, we analyze the finite-key security of two prominent MDI-QKD schemes—a symmetric three-intensity decoy-state MDI-QKD protocol and a four-intensity decoy-state MDI-QKD protocol—and determine their robustness against information leakage from both the intensity modulator and the phase modulator of the transmitters. Our work shows that MDI-QKD is feasible within a reasonable time frame of signal transmission given that the sources are sufficiently isolated. Thus, it provides an essential reference for experimentalists to ensure the security of implementations of MDI-QKD in the presence of information leakage.

Highlights

  • Measurement-device-independent quantum key distribution (MDI-QKD) can remove all detection side-channels from quantum communication systems

  • Our results show that MDI-QKD is more sensitive to information leakage than standard decoy-state QKD

  • We have quantitatively analyzed the security of two decoy-state MDI-QKD protocols with leaky sources in the finite-key regime

Read more

Summary

Introduction

Measurement-device-independent quantum key distribution (MDI-QKD) can remove all detection side-channels from quantum communication systems. Our work shows that MDI-QKD is feasible within a reasonable time frame of signal transmission given that the sources are sufficiently isolated It provides an essential reference for experimentalists to ensure the security of implementations of MDI-QKD in the presence of information leakage. Various types of quantum hacking attacks have been proposed and experimentally demonstrated recently, which exploit device’ imperfections in practical QKD ­systems[4] To tackle these implementation security loopholes, many efforts have been made, among which device-independent (DI) Q­ KD5–7 and measurementdevice-independent (MDI) ­QKD8 are two prominent approaches. Inspired by the results introduced ­in[23,24,25], which study the information leakage problem in standard decoy-state QKD systems, here we relax such an unrealistic requirement and perform a finite-key security analysis of MDI-QKD with leaky sources. We show that MDI-QKD is feasible within a reasonable time frame of signal transmission given that Alice’s and Bob’s sources are sufficiently isolated

Methods
Results
Conclusion

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.