Abstract

Quantum key distribution (QKD) can share an unconditional secure key between two remote parties, but the deviation between theory and practice will break the security of the generated key. In this paper, we evaluate the security of QKD with weak basis-choice flaws, in which the random bits used by Alice and Bob are weakly controlled by Eve. Based on the definition of Li et al. (Sci Rep 5:16200, 2015) and GLLP’s analysis, we obtain a tight and analytical bound to estimate the phase error and key rate for both the single photon source and the weak coherent source. Our approach largely increases the key rate from that of the original approach. Finally, we investigate and confirm the security of BB84-QKD with a practical commercial devices.

Highlights

  • Quantum key distribution (QKD) can share an unconditional secure key between two remote parties, but the deviation between theory and practice will break the security of the generated key

  • We develop an analytical formula that estimates the key rate for both the single photon source (SPS) and the weak coherent source (WPS)

  • The final key rate was significantly improved by the proposed approach

Read more

Summary

Introduction

Quantum key distribution (QKD) can share an unconditional secure key between two remote parties, but the deviation between theory and practice will break the security of the generated key. Many loopholes have been discovered in practical QKD ­systems[15,16,17,18,19,20,21] These loopholes are closed by two main approaches: device-independent QKD protocols and security patches. The time cost is incurred by the complexity or cost of post processing, and local (rather than global) optimization compromises the security of the generated key To mitigate these problems, we develop an analytical formula that estimates the key rate for both the single photon source (SPS) and the weak coherent source (WPS). To evaluate the performance of QKD under wavelength attack, we estimate the key rate of a practical QKD system with a passive basis-choice

Methods
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call