† Corresponding author. E-mail:
Project supported by the National Basic Research Program of China (Grant No. 2013CB338002) and the National Natural Science Foundation of China (Grants Nos. 11304397 and 61505261).
Compared with full device-independent quantum key distribution (DI-QKD), one-side device-independent QKD (1sDI-QKD) needs fewer requirements, which is much easier to meet. In this paper, by applying recently developed novel time–energy entropic uncertainty relations, we present a time–energy high-dimensional one-side device-independent quantum key distribution (HD-QKD) and provide the security proof against coherent attacks. Besides, we connect the security with the quantum steering. By numerical simulation, we obtain the secret key rate for Alice’s different detection efficiencies. The results show that our protocol can performance much better than the original 1sDI-QKD. Furthermore, we clarify the relation among the secret key rate, Alice’s detection efficiency, and the dispersion coefficient. Finally, we simply analyze its performance in the optical fiber channel.
Using quantum key distribution (QKD), two distant communication parties, called Alice and Bob, can generate secret keys, with the security based on the fundamental laws of quantum mechanics.[1, 2] Although QKD is unconditionally secure, some gaps exist in theoretical and practical security of QKD due to imperfections of QKD devices. Using these security loopholes, the eavesdropper Eve can perform some attacks, such as faked state attacks,[3,4] after-gate attacks,[5] dead time attacks,[6] and wavelength-dependent attacks.[7] Since the first QKD protocol, BB84 protocol,[8] was proposed, QKD gets quick development in theory and experiments,[9–13] and lots of work on eliminating these gaps have been done.[14–19]
One of the most promising approaches of eliminating these gaps is device-independent QKD (DI-QKD).[20,21] The security of DI-QKD is guaranteed by the observed violation of Bell inequalities[22] and it requires the minimal set of assumptions. However, to test the violation of Bell inequalities, detectors used in DI-QKD are required to ensure very high detection efficiencies.[21] Therefore, it is an extreme challenge to demonstrate DI-QKD in practice. To relax constraints of DI-QKD, some valuable proposals for QKD have been proposed as compromises between device-dependent QKD and device-independent QKD.
Based on dimension witnesses,[23] Pawłowski and Brunner[24] proposed a DI-QKD scenario with relaxed constraints, which is called semi-device-independent QKD (SDI-QKD), and proved its security against individual attacks. To remove detector side channel attacks, the idea of measurement-device-independent QKD (MDI-QKD)[25,26] is proposed and developed.[27–29] Some important aspects are studied in recent years.[30–33] Although those ideas can remove detector side channel attacks and double the secure transmittance distance, they require the perfect performance of the source. Furthermore, Branciard et al.[34] present a trade-off scenario, called one-side device-independent QKD (1sDI-QKD), between device-dependent QKD and device-independent QKD and analyze its security and feasibility by connecting the scenario with quantum steering.[35] 1sDI-QKD can be applied to some special conditions, e.g., establishing secret keys between a bank with its clients, where a bank can invest lots of money to set up reliable apparatus, while clients may use cheap and insecure terminals. In recent years, some relevant researches have been finished.[36–38]
However, in the original 1sDI-QKD, the photon information efficiency limits the rate of generation the key (no more than 1 bit per coincidence). Coding information in high-dimensional photonic degrees of freedom is a promising way to break the limitation. Furthermore, high-dimensional correlations can tolerate more noise.[39]
Some photonic degrees of freedom have been applied in HD-QKD, including position-momentum,[40] time–energy,[41–43] transverse momentum,[44] and orbital angular momentum.[45–47] Based on time–energy entanglement, Mower et al.[48] proposed a new high-dimensional QKD (HD-QKD) protocol using dispersive optics, which is called DO-QKD. Its security against collective attacks has been proven in Ref. [49] and its practical security analysis has been studied.[50–53] Recently, by deriving a novel entropic uncertainty relation for time and conjugate-time measurements using dispersive optics, Niu et al.[54] proved its security against general attacks.
In this paper, we extend time–energy high-dimensional code into 1sDI-QKD and propose a new protocol, so-called time–energy high-dimensional one-side device-independent QKD protocol (1sDI-HDQKD). Using the novel time–energy entropic uncertainty relation, we prove the security of our protocol against coherent attacks. By numerical simulation, we show that our protocol achieves more bits information per coincidence and requires lower detection efficiencies than the original 1sDI-QKD protocol. Then we relate the security of our protocol to violation of an EPR steering inequality.
The rest of this paper is organized as follows. In Section
The schematic of our protocol, the 1sDI-HDQKD protocol, is shown in Fig.
Recently, Niu et al.[54] proposed and proof a novel time–energy uncertainty relation for smooth entropies. By using the novel uncertainty relation, we present the secure key rate of our time–energy HD-1sDI-QKD. Noted that Alice’s measurement apparatuses are untrusted, the assumption that the devices are memoryless is needed as in Ref. [55].
Through the classical post-processing process, from the postselected n-bit strings
According to the chain rule[57] and the data-processing[58] inequality for smooth min-entropies, we have the following relationship:
Using the novel time–energy uncertainty relation for smooth min-entropies,[54] we have
Substituting Eqs. (
Considering the imperfect reconciliation efficiency
The positive raw key is the precondition of generating positive secret key. Considering raw key, the raw key rate can be written as
We first denote
According to Eq. (
Then Bob’s statistics conditioned on λ are given by a quantum state assumption. So they must fulfill all quantum uncertainty relations, and particularly
Denoting
Before performing the numerical simulation, we should confirm some parameters.
According the time–energy uncertainty relation, we can determine the overlap
The code distance determines if the QKD protocol is aborted or not, so we should choose a much bigger value than thresholds in order to have non-zero key rate. In the HDQKD protocol with two trustworthy parties, the value is set as 2.0.[54] In our protocol, it should not be less than that. All other parameters are taken from Ref. [54] and listed in Table
Figure
It seems that increasing the GVD coefficient
From Fig.
For clarifying the relation among the secret key rat r, Alice’s detection efficiency
Then we consider the performance of our protocol in the standard optical fiber channel. For simplifying the analysis, we adapt the scenario shown in Fig.
Figure
In this paper, we propose a new time–energy high-dimensional 1sDI-QKD protocol and present the proof of security against coherent attacks. Besides, we connect our protocol with quantum steering. Our results shows that our protocol also requires the violation of an EPR-steering inequality. By numerical simulation, we shows that our protocol need fewer requirements than the original 1sDI-QKD protocol while can achieve higher secret key rate. Typically we can achieve non-zero key rate with
[1] | |
[2] | |
[3] | |
[4] | |
[5] | |
[6] | |
[7] | |
[8] | |
[9] | |
[10] | |
[11] | |
[12] | |
[13] | |
[14] | |
[15] | |
[16] | |
[17] | |
[18] | |
[19] | |
[20] | |
[21] | |
[22] | |
[23] | |
[24] | |
[25] | |
[26] | |
[27] | |
[28] | |
[29] | |
[30] | |
[31] | |
[32] | |
[33] | |
[34] | |
[35] | |
[36] | |
[37] | |
[38] | |
[39] | |
[40] | |
[41] | |
[42] | |
[43] | |
[44] | |
[45] | |
[46] | |
[47] | |
[48] | |
[49] | |
[50] | |
[51] | |
[52] | |
[53] | |
[54] | |
[55] | |
[56] | |
[57] | |
[58] | |
[59] | |
[60] | |
[61] | |
[62] |