Measurement-device-independent quantum key distribution with leaky sources

Abstract Measurement-device-independent quantum key distribution (MDI-QKD) can remove all detection side-channels from quantum communication systems. The security proofs require, however, that certain assumptions on the sources are satisfied. This includes, for instance, the requirement that there i...

Descripción completa

Guardado en:
Detalles Bibliográficos
Autores principales: Weilong Wang, Kiyoshi Tamaki, Marcos Curty
Formato: article
Lenguaje:EN
Publicado: Nature Portfolio 2021
Materias:
R
Q
Acceso en línea:https://doaj.org/article/72f35afdef8d4656823bfdd5f3802586
Etiquetas: Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
id oai:doaj.org-article:72f35afdef8d4656823bfdd5f3802586
record_format dspace
spelling oai:doaj.org-article:72f35afdef8d4656823bfdd5f38025862021-12-02T13:50:42ZMeasurement-device-independent quantum key distribution with leaky sources10.1038/s41598-021-81003-22045-2322https://doaj.org/article/72f35afdef8d4656823bfdd5f38025862021-01-01T00:00:00Zhttps://doi.org/10.1038/s41598-021-81003-2https://doaj.org/toc/2045-2322Abstract Measurement-device-independent quantum key distribution (MDI-QKD) can remove all detection side-channels from quantum communication systems. The security proofs require, however, that certain assumptions on the sources are satisfied. This includes, for instance, the requirement that there is no information leakage from the transmitters of the senders, which unfortunately is very difficult to guarantee in practice. In this paper we relax this unrealistic assumption by presenting a general formalism to prove the security of MDI-QKD with leaky sources. With this formalism, we analyze the finite-key security of two prominent MDI-QKD schemes—a symmetric three-intensity decoy-state MDI-QKD protocol and a four-intensity decoy-state MDI-QKD protocol—and determine their robustness against information leakage from both the intensity modulator and the phase modulator of the transmitters. Our work shows that MDI-QKD is feasible within a reasonable time frame of signal transmission given that the sources are sufficiently isolated. Thus, it provides an essential reference for experimentalists to ensure the security of implementations of MDI-QKD in the presence of information leakage.Weilong WangKiyoshi TamakiMarcos CurtyNature PortfolioarticleMedicineRScienceQENScientific Reports, Vol 11, Iss 1, Pp 1-11 (2021)
institution DOAJ
collection DOAJ
language EN
topic Medicine
R
Science
Q
spellingShingle Medicine
R
Science
Q
Weilong Wang
Kiyoshi Tamaki
Marcos Curty
Measurement-device-independent quantum key distribution with leaky sources
description Abstract Measurement-device-independent quantum key distribution (MDI-QKD) can remove all detection side-channels from quantum communication systems. The security proofs require, however, that certain assumptions on the sources are satisfied. This includes, for instance, the requirement that there is no information leakage from the transmitters of the senders, which unfortunately is very difficult to guarantee in practice. In this paper we relax this unrealistic assumption by presenting a general formalism to prove the security of MDI-QKD with leaky sources. With this formalism, we analyze the finite-key security of two prominent MDI-QKD schemes—a symmetric three-intensity decoy-state MDI-QKD protocol and a four-intensity decoy-state MDI-QKD protocol—and determine their robustness against information leakage from both the intensity modulator and the phase modulator of the transmitters. Our work shows that MDI-QKD is feasible within a reasonable time frame of signal transmission given that the sources are sufficiently isolated. Thus, it provides an essential reference for experimentalists to ensure the security of implementations of MDI-QKD in the presence of information leakage.
format article
author Weilong Wang
Kiyoshi Tamaki
Marcos Curty
author_facet Weilong Wang
Kiyoshi Tamaki
Marcos Curty
author_sort Weilong Wang
title Measurement-device-independent quantum key distribution with leaky sources
title_short Measurement-device-independent quantum key distribution with leaky sources
title_full Measurement-device-independent quantum key distribution with leaky sources
title_fullStr Measurement-device-independent quantum key distribution with leaky sources
title_full_unstemmed Measurement-device-independent quantum key distribution with leaky sources
title_sort measurement-device-independent quantum key distribution with leaky sources
publisher Nature Portfolio
publishDate 2021
url https://doaj.org/article/72f35afdef8d4656823bfdd5f3802586
work_keys_str_mv AT weilongwang measurementdeviceindependentquantumkeydistributionwithleakysources
AT kiyoshitamaki measurementdeviceindependentquantumkeydistributionwithleakysources
AT marcoscurty measurementdeviceindependentquantumkeydistributionwithleakysources
_version_ 1718392444071968768