中国物理B ›› 2023, Vol. 32 ›› Issue (5): 50308-050308.doi: 10.1088/1674-1056/ac9b03

• • 上一篇    下一篇

Phase-matching quantum key distribution with imperfect sources

Xiao-Xu Zhang(张晓旭)1,2,3, Yi-Fei Lu(陆宜飞)1,2, Yang Wang(汪洋)1,2,†, Mu-Sheng Jiang(江木生)1,2, Hong-Wei Li(李宏伟)1,2, Chun Zhou(周淳)1,2, Yu Zhou(周雨)1,2, and Wan-Su Bao(鲍皖苏)1,2,‡   

  1. 1 Henan Key Laboratory of Quantum Information and Cryptography, SSF IEU, Zhengzhou 450001, China;
    2 Synergetic Innovation Centre of Quantum Information and Quantum Physics, University of Science and Technology of China, Hefei 230026, China;
    3 Basic Department, SSF IEU, Zhengzhou 450001, China
  • 收稿日期:2022-07-09 修回日期:2022-09-22 接受日期:2022-10-18 出版日期:2023-04-21 发布日期:2023-05-05
  • 通讯作者: Yang Wang, Wan-Su Bao E-mail:wy@qiclab.cn;bws@qiclab.cn
  • 基金资助:
    Project supported by the National Key Research and Development Program of China (Grant Nos. 2020YFA0309702 and 2020YFA0309701), the National Natural Science Foundation of China (Grant No. 62101597), the China Postdoctoral Science Foundation (Grant No. 2021M691536), the Natural Science Foundation of Henan (Grant Nos. 202300410534 and 202300410532), and the Anhui Initiative in Quantum Information Technologies.

Phase-matching quantum key distribution with imperfect sources

Xiao-Xu Zhang(张晓旭)1,2,3, Yi-Fei Lu(陆宜飞)1,2, Yang Wang(汪洋)1,2,†, Mu-Sheng Jiang(江木生)1,2, Hong-Wei Li(李宏伟)1,2, Chun Zhou(周淳)1,2, Yu Zhou(周雨)1,2, and Wan-Su Bao(鲍皖苏)1,2,‡   

  1. 1 Henan Key Laboratory of Quantum Information and Cryptography, SSF IEU, Zhengzhou 450001, China;
    2 Synergetic Innovation Centre of Quantum Information and Quantum Physics, University of Science and Technology of China, Hefei 230026, China;
    3 Basic Department, SSF IEU, Zhengzhou 450001, China
  • Received:2022-07-09 Revised:2022-09-22 Accepted:2022-10-18 Online:2023-04-21 Published:2023-05-05
  • Contact: Yang Wang, Wan-Su Bao E-mail:wy@qiclab.cn;bws@qiclab.cn
  • Supported by:
    Project supported by the National Key Research and Development Program of China (Grant Nos. 2020YFA0309702 and 2020YFA0309701), the National Natural Science Foundation of China (Grant No. 62101597), the China Postdoctoral Science Foundation (Grant No. 2021M691536), the Natural Science Foundation of Henan (Grant Nos. 202300410534 and 202300410532), and the Anhui Initiative in Quantum Information Technologies.

摘要: The huge discrepancies between actual devices and theoretical assumptions severely threaten the security of quantum key distribution. Recently, a general new framework called the reference technique has attracted wide attention in defending against the imperfect sources of quantum key distribution. Here, the state preparation flaws, the side channels of mode dependencies, the Trojan horse attacks, and the pulse classical correlations are studied by using the reference technique on the phase-matching protocol. Our simulation results highlight the importance of the actual secure parameters choice for transmitters, which is necessary to achieve secure communication. Increasing the single actual secure parameter will reduce the secure key rate. However, as long as the parameters are set properly, the secure key rate is still high. Considering the influences of multiple actual secure parameters will significantly reduce the secure key rate. These actual secure parameters must be considered when scientists calibrate transmitters. This work is an important step towards the practical and secure implementation of phase-matching protocol. In the future, it is essential to study the main parameters, find out their maximum and general values, classify the multiple parameters as the same parameter, and give countermeasures.

关键词: quantum key distribution, reference technique, imperfect sources, phase-matching

Abstract: The huge discrepancies between actual devices and theoretical assumptions severely threaten the security of quantum key distribution. Recently, a general new framework called the reference technique has attracted wide attention in defending against the imperfect sources of quantum key distribution. Here, the state preparation flaws, the side channels of mode dependencies, the Trojan horse attacks, and the pulse classical correlations are studied by using the reference technique on the phase-matching protocol. Our simulation results highlight the importance of the actual secure parameters choice for transmitters, which is necessary to achieve secure communication. Increasing the single actual secure parameter will reduce the secure key rate. However, as long as the parameters are set properly, the secure key rate is still high. Considering the influences of multiple actual secure parameters will significantly reduce the secure key rate. These actual secure parameters must be considered when scientists calibrate transmitters. This work is an important step towards the practical and secure implementation of phase-matching protocol. In the future, it is essential to study the main parameters, find out their maximum and general values, classify the multiple parameters as the same parameter, and give countermeasures.

Key words: quantum key distribution, reference technique, imperfect sources, phase-matching

中图分类号:  (Quantum cryptography and communication security)

  • 03.67.Dd
03.67.Hk (Quantum communication) 03.67.-a (Quantum information)