Measurement-device-independent quantum key distribution (MDI-QKD) can be immune to all detector side- channel attacks and guarantee the information-theoretical security even with uncharacterized single photon detect...Measurement-device-independent quantum key distribution (MDI-QKD) can be immune to all detector side- channel attacks and guarantee the information-theoretical security even with uncharacterized single photon detectors. MDI-QKD has been demonstrated in both laboratories and field-tests by using attenuated lasers combined with the decoy-state technique. However, it is a critical assumption that the sources used by legitimate participants are trusted in MDI-QKD. Hence, it is possible that a potential security risk exists. Here we propose a new scheme of polarization-encoding-based MDI-QKD with a single untrusted source, by which the complexity of the synchronization system can be reduced and the success rate of the Bell-state measurement can be improved. Meanwhile, the decoy-state method is employed to avoid the security issues introduced by a non-ideal single photon source. We also derive a security analysis of the proposed system. In addition, it seems to be a promising candidate for the implementation for QKD network in the near future.展开更多
Measurement-device-independent quantum key distribution (MDI-QKD) is proven to be immune to all the de- tector side channel attacks. With two symmetric quantum channels, the maximal transmission distance can be doub...Measurement-device-independent quantum key distribution (MDI-QKD) is proven to be immune to all the de- tector side channel attacks. With two symmetric quantum channels, the maximal transmission distance can be doubled when compared with the prepare-and-measure QKD. An interesting question is whether the transmission distance can be extended further. In this work, we consider the contributions of the two-way local operations and classical communications to the key generation rate and transmission distance of the MDI-QKD. Our numerical results show that the secure transmission distances are increased by about 12kin and 8 km when the 1 13 and the 2 B steps are implemented, respectively.展开更多
Measurement-device-independent quantum key distribution (MDI-QKD) eliminates all loopholes on detection. 3 loss in the final key for the Previous experiments of time-bin phase-encoding MDI-QKD allow a factor of inc...Measurement-device-independent quantum key distribution (MDI-QKD) eliminates all loopholes on detection. 3 loss in the final key for the Previous experiments of time-bin phase-encoding MDI-QKD allow a factor of incapability of identifying two successive detection events by a single photon detector. Here we propose a new scheme to realize the time-bin phase-encoding MDI-QKD. The polarization states are used to generate the time bins and the phase-encoding states. The factor of loss in the final key is eliminated by using four single photon detectors at the measurement site. We show the feasibility of our scheme with a proof-of-principle experimental demonstration. The phase reference frame is rotated extremely slowly with only passive stabilization measures. The quantum bit error rate can reach 0.8% in the Z-basis and 26.2% in the X-basis.展开更多
The effects of weather conditions are ubiquitous in practical wireless quantum communication links.Here in this work,the performances of atmospheric continuous-variable measurement-device-independent quantum key distr...The effects of weather conditions are ubiquitous in practical wireless quantum communication links.Here in this work,the performances of atmospheric continuous-variable measurement-device-independent quantum key distribution(CV-MDI-QKD)under diverse weather conditions are analyzed quantitatively.According to the Mie scattering theory and atmospheric CV-MDI-QKD model,we numerically simulate the relationship between performance of CV-MDI-QKD and the rainy and foggy conditions,aiming to get close to the actual combat environment in the future.The results show that both rain and fog will degrade the performance of the CV-MDI-QKD protocol.Under the rainy condition,the larger the raindrop diameter,the more obvious the extinction effect is and the lower the secret key rate accordingly.In addition,we find that the secret key rate decreases with the increase of spot deflection distance and the fluctuation of deflection.Under the foggy condition,the results illustrate that the transmittance decreases with the increase of droplet radius or deflection distance,which eventually yields the decrease in the secret key rate.Besides,in both weather conditions,the increase of transmission distance also leads the secret key rate to deteriorate.Our work can provide a foundation for evaluating the performance evaluation and successfully implementing the atmospheric CV-MDI-QKD in the future field operation environment under different weather conditions.展开更多
We propose a new scheme to enhance the performance of the Gussian-modulated coherent-state continuous-variable measurement-device-independent quantum key distribution(CV-MDI-QKD)system via quantum scissors(QS)operatio...We propose a new scheme to enhance the performance of the Gussian-modulated coherent-state continuous-variable measurement-device-independent quantum key distribution(CV-MDI-QKD)system via quantum scissors(QS)operation at Bob's side.As an non-deterministic amplifying setup,we firstly introduce the QS-enhanced CV-MDI-QKD protocol and then investigate the success probability of the QS operation in accordance with the equivalent one-way scheme.Afterwards,we investigate the effect of the QS operation on the proposed scheme and analyze the performance of the QS-enhanced CV-MDI-QKD system under the extreme asymmetric circumstance.Simulation results show that the QS operation can indeed improve the performance of the CV-MDI-QKD system considerably.QS-enhanced CV-MDI-QKD protocol outperforms the original CV-MDI-QKD protocol in both the maximum transmission distance and the secret key rate.Moreover,the better the performance of QS operation,the more significant the improvement of performance of the system.展开更多
In principle,the asynchronous measurement-device-independent quantum key distribution(AMDI-QKD)can surpass the key rate capacity without phase tracking and phase locking.However,practical imperfections in sources or d...In principle,the asynchronous measurement-device-independent quantum key distribution(AMDI-QKD)can surpass the key rate capacity without phase tracking and phase locking.However,practical imperfections in sources or detections would dramatically depress its performance.Here,we present an improved model on AMDI-QKD to reduce the influence of these imperfections,including intensity fluctuation,the afterpulse effect,and the dead time of detectors.Furthermore,we carry out corresponding numerical simulations.Simulation results show that,by implementing our present work,it can have more than 100 km longer secure transmission distance and one order of magnitude enhancement in the key generation rate after 320 km compared with the standard method.Moreover,our model can still break the Pirandola–Laurenza–Ottaviani–Banchi(PLOB)bound even under realistic experimental conditions.展开更多
In this paper, we propose a measurement-device-independent quantum-key-distribution(MDI-QKD) protocol using orbital angular momentum(OAM) in free space links, named the OAM-MDI-QKD protocol. In the proposed protoc...In this paper, we propose a measurement-device-independent quantum-key-distribution(MDI-QKD) protocol using orbital angular momentum(OAM) in free space links, named the OAM-MDI-QKD protocol. In the proposed protocol,the OAM states of photons, instead of polarization states, are used as the information carriers to avoid the reference frame alignment, the decoy-state is adopted to overcome the security loophole caused by the weak coherent pulse source, and the high efficient OAM-sorter is adopted as the measurement tool for Charlie to obtain the output OAM state. Here, Charlie may be an untrusted third party. The results show that the authorized users, Alice and Bob, could distill a secret key with Charlie's successful measurements, and the key generation performance is slightly better than that of the polarization-based MDI-QKD protocol in the two-dimensional OAM cases. Simultaneously, Alice and Bob can reduce the number of flipping the bits in the secure key distillation. It is indicated that a higher key generation rate performance could be obtained by a high dimensional OAM-MDI-QKD protocol because of the unlimited degree of freedom on OAM states. Moreover,the results show that the key generation rate and the transmission distance will decrease as the growth of the strength of atmospheric turbulence(AT) and the link attenuation. In addition, the decoy states used in the proposed protocol can get a considerable good performance without the need for an ideal source.展开更多
Measurement-device-independent quantum key distribution(MDI-QKD)provides us a powerful approach to resist all attacks at detection side.Besides the unconditional security,people also seek for high key generation rate,...Measurement-device-independent quantum key distribution(MDI-QKD)provides us a powerful approach to resist all attacks at detection side.Besides the unconditional security,people also seek for high key generation rate,but MDI-QKD has relatively low key generation rate.In this paper,we provide an efficient approach to increase the key generation rate of MDI-QKD by adopting multiple degrees of freedom(DOFs)of single photons to generate keys.Compared with other high-dimension MDI-QKD protocols encoding in one DOF,our protocol is more flexible,for our protocol generating keys in independent subsystems and the detection failure or error in a DOF not affecting the information encoding in other DOFs.Based on above features,our MDI-QKD protocol may have potential application in future quantum comniunication field.展开更多
Statistical fluctuations are unavoidable in realistic quantum key distribution (QKD) due to finite-size effect. Based on the four-intensity proposal on measurement-device-independent QKD (MDI-QKD) in [Phys. Rev. A93 (...Statistical fluctuations are unavoidable in realistic quantum key distribution (QKD) due to finite-size effect. Based on the four-intensity proposal on measurement-device-independent QKD (MDI-QKD) in [Phys. Rev. A93 (2016) 042324], we particularly analyze the scenario that only three intensities are used, namely a three-intensity decoy-state MDI-QKD with biased basis choice. After performing full parameter optimization method, simulations results demonstrate that this scenario can obtain distinct enhancement compared with the conventional unbiased threeintensity decoy-state method, e.g. Xu et al.’s [Phys. Rev. A 89 (2014) 052333]. Furthermore, results also show that it works more efficiently by using HSPS than using WCS at longer transmission distance.展开更多
Measurement device-independent quantum key distribution(MDI-QKD) protocols are immune to all possible attacks on the photon detectors during quantum communication, but their key generation rates are low compared with ...Measurement device-independent quantum key distribution(MDI-QKD) protocols are immune to all possible attacks on the photon detectors during quantum communication, but their key generation rates are low compared with those of other QKD schemes.Increasing each individual photon’s channel capacity is an efficient way to increase the key generation rate, and high-dimensional(HD) encoding is a powerful tool for increasing the channel capacity of photons. In this paper, we propose an HD MDI-QKD protocol with qudits hyper-encoded in spatial mode and polarization degrees of freedom(DOFs). In the proposed protocol, keys can be generated using the spatial mode and polarization DOFs simultaneously. The proposed protocol is unconditionally secure,even for weak coherent pulses with decoy states. The proposed MDI-QKD protocol may be useful for future quantum secure communication applications.展开更多
We propose a discrete-modulated continuous-variable measurement-device-independent quantum key distribution protocol over a fiber-to-water channel.Different from optical fibers,the underwater channel has more severe o...We propose a discrete-modulated continuous-variable measurement-device-independent quantum key distribution protocol over a fiber-to-water channel.Different from optical fibers,the underwater channel has more severe optical attenuation because of optical absorption and scattering,which reduces the maximum communication distance.To enhance the performance of the protocol,the photon subtraction operation is implemented at the modulator side.We carry out a performance simulation in two different kinds of seawater channel,and the result shows that the scheme with photon subtraction has a longer secure communication distance under certain conditions.展开更多
Measurement-device-independent quantum key distribution(MDI-QKD) is immune to detector side channel attacks, which is a crucial security loophole problem in traditional QKD. In order to relax a key assumption that the...Measurement-device-independent quantum key distribution(MDI-QKD) is immune to detector side channel attacks, which is a crucial security loophole problem in traditional QKD. In order to relax a key assumption that the sources are trusted in MDI-QKD, an MDI-QKD protocol with an untrusted source has been proposed. For the security of MDI-QKD with an untrusted source, imperfections in the practical experiment should also be taken into account. In this paper, we analyze the effects of fluctuations of internal transmittance on the security of a decoy-state MDI-QKD protocol with an untrusted source. Our numerical results show that both the secret key rate and the maximum secure transmission distance decrease when taken fluctuations of internal transmittance into consideration. Especially, they are more sensitive when Charlie's mean photon number per pulse is smaller. Our results emphasize that the stability of correlative optical devices is important for practical implementations.展开更多
Reference-frame-independent measurement-device-independent QKD(RFI-MDI-QKD), immune to both the slow unknown drift of reference frames and detector side channel attacks, can generate information-theoretic secure keys....Reference-frame-independent measurement-device-independent QKD(RFI-MDI-QKD), immune to both the slow unknown drift of reference frames and detector side channel attacks, can generate information-theoretic secure keys. Despite its natural resistance to the slow drift of reference frames, the performance of practical RFI-MDI-QKD systems descends with the increasing drift of reference frames. In this paper, we demonstrate the worst relative rotation of reference frames for practical RFI-MDI-QKD systems, and investigate their performance against the worst-case scenario,both of which are unclear to date. Simulation results show that, practical RFI-MDI-QKD systems can achieve quite good performance even against the worst-case scenario, which clearly demonstrates that it is possible to implement practical MDI-QKD systems with freely drifting reference frames.展开更多
Recently, a novel reference-frame-independent measurement-device-independent quantum key distribution protocol was proposed, which can remove all detector side channels as well as tolerate unknown and slow variance of...Recently, a novel reference-frame-independent measurement-device-independent quantum key distribution protocol was proposed, which can remove all detector side channels as well as tolerate unknown and slow variance of reference frame without active alignment. In this paper, we propose a new tomographic method to estimate the key rate in that protocol. We estimate the key rate using conventional method and tomographic method respectively and compare the two methods by numerical simulation. The numerical simulation results show that tomographic approach is equivalent to the conventional approach, which can be used as an alternative method.展开更多
Quantum key distribution(QKD)is a technology that can resist the threat of quantum computers to existing conventional cryptographic protocols.However,due to the stringent requirements of the quantum key generation env...Quantum key distribution(QKD)is a technology that can resist the threat of quantum computers to existing conventional cryptographic protocols.However,due to the stringent requirements of the quantum key generation environment,the generated quantum keys are considered valuable,and the slow key generation rate conflicts with the high-speed data transmission in traditional optical networks.In this paper,for the QKD network with a trusted relay,which is mainly based on point-to-point quantum keys and has complex changes in network resources,we aim to allocate resources reasonably for data packet distribution.Firstly,we formulate a linear programming constraint model for the key resource allocation(KRA)problem based on the time-slot scheduling.Secondly,we propose a new scheduling scheme based on the graded key security requirements(GKSR)and a new micro-log key storage algorithm for effective storage and management of key resources.Finally,we propose a key resource consumption(KRC)routing optimization algorithm to properly allocate time slots,routes,and key resources.Simulation results show that the proposed scheme significantly improves the key distribution success rate and key resource utilization rate,among others.展开更多
The reference-frame-independent(RFI)quantum key distribution(QKD)is suitable for satellite-based links by removing the active alignment on the reference frames.However,how the beam wandering influences the performance...The reference-frame-independent(RFI)quantum key distribution(QKD)is suitable for satellite-based links by removing the active alignment on the reference frames.However,how the beam wandering influences the performance of RFI-QKD remains a pending issue in satellite-to-ground links.In this paper,based on the mathematical model for characterizing beam wandering,we present the security analysis for satellite-to-ground RFI-QKD and analytically derive formulas for calculating the secret key rate with beam wandering.Our simulation results show that the performance of RFI-QKD is better than the Bennett–Brassard 1984(BB84)QKD with beam wandering in asymptotic case.Furthermore,the degree of influences of beam wandering is specifically presented for satellite-to-ground RFI-QKD when statistical fluctuations are taken into account.Our work can provide theoretical support for the realization of RFI-QKD using satellite-to-ground links and have implications for the construction of large-scale satellite-based quantum networks.展开更多
The data post-processing scheme based on two-way classical communication(TWCC)can improve the tolerable bit error rate and extend the maximal transmission distance when used in a quantum key distribution(QKD)system.In...The data post-processing scheme based on two-way classical communication(TWCC)can improve the tolerable bit error rate and extend the maximal transmission distance when used in a quantum key distribution(QKD)system.In this study,we apply the TWCC method to improve the performance of reference-frame-independent quantum key distribution(RFI-QKD),and analyze the influence of the TWCC method on the performance of decoy-state RFI-QKD in both asymptotic and non-asymptotic cases.Our numerical simulation results show that the TWCC method is able to extend the maximal transmission distance from 175 km to 198 km and improve the tolerable bit error rate from 10.48%to 16.75%.At the same time,the performance of RFI-QKD in terms of the secret key rate and maximum transmission distance are still greatly improved when statistical fluctuations are considered.We conclude that RFI-QKD with the TWCC method is of practical interest.展开更多
Encoding system plays a significant role in quantum key distribution(QKD).However,the security and performance of QKD systems can be compromised by encoding misalignment due to the inevitable defects in realistic devi...Encoding system plays a significant role in quantum key distribution(QKD).However,the security and performance of QKD systems can be compromised by encoding misalignment due to the inevitable defects in realistic devices.To alleviate the influence of misalignments,a method exploiting statistics from mismatched basis is proposed to enable uncharacterized sources to generate secure keys in QKD.In this work,we propose a scheme on four-intensity decoy-state quantum key distribution with uncharacterized heralded single-photon sources.It only requires the source states are prepared in a two-dimensional Hilbert space,and can thus reduce the complexity of practical realizations.Moreover,we carry out corresponding numerical simulations and demonstrate that our present four-intensity decoy-state scheme can achieve a much higher key rate compared than a three-intensity decoy-state method,and meantime it can obtain a longer transmission distance compared than the one using weak coherent sources.展开更多
Quantum key distribution(QKD),rooted in quantum mechanics,offers information-theoretic security.However,practi-cal systems open security threats due to imperfections,notably bright-light blinding attacks targeting sin...Quantum key distribution(QKD),rooted in quantum mechanics,offers information-theoretic security.However,practi-cal systems open security threats due to imperfections,notably bright-light blinding attacks targeting single-photon detectors.Here,we propose a concise,robust defense strategy for protecting single-photon detectors in QKD systems against blinding attacks.Our strategy uses a dual approach:detecting the bias current of the avalanche photodiode(APD)to defend against con-tinuous-wave blinding attacks,and monitoring the avalanche amplitude to protect against pulsed blinding attacks.By integrat-ing these two branches,the proposed solution effectively identifies and mitigates a wide range of bright light injection attempts,significantly enhancing the resilience of QKD systems against various bright-light blinding attacks.This method forti-fies the safeguards of quantum communications and offers a crucial contribution to the field of quantum information security.展开更多
Quantum key distribution(QKD)in principle can provide unconditional secure communication between distant parts.However,when finite-key length is taken into account,the security can only be ensured within certain secur...Quantum key distribution(QKD)in principle can provide unconditional secure communication between distant parts.However,when finite-key length is taken into account,the security can only be ensured within certain security level.In this paper,we adopt the Chernoff bound analysis method to deal with finite-key-size effects,carrying out corresponding investigations on the relationship between the key generation rate and security parameters for different protocols,including BB84,measurement-device-independent and twin-field QKD protocols.Simulation results show that there exists a fundamental limit between the key rate and the security parameters.Therefore,this study can provide valuable references for practical application of QKD,getting a nice balance between the key generation rate and the security level.展开更多
基金Supported by the National Natural Science Foundation of China under Grant Nos 61372076 and 61301171the 111 Project under Grant No B08038
文摘Measurement-device-independent quantum key distribution (MDI-QKD) can be immune to all detector side- channel attacks and guarantee the information-theoretical security even with uncharacterized single photon detectors. MDI-QKD has been demonstrated in both laboratories and field-tests by using attenuated lasers combined with the decoy-state technique. However, it is a critical assumption that the sources used by legitimate participants are trusted in MDI-QKD. Hence, it is possible that a potential security risk exists. Here we propose a new scheme of polarization-encoding-based MDI-QKD with a single untrusted source, by which the complexity of the synchronization system can be reduced and the success rate of the Bell-state measurement can be improved. Meanwhile, the decoy-state method is employed to avoid the security issues introduced by a non-ideal single photon source. We also derive a security analysis of the proposed system. In addition, it seems to be a promising candidate for the implementation for QKD network in the near future.
基金Supported by the National Natural Science Foundation of China under Grant No 61378011the Program for Science and Technology Innovation Research Team in University of Henan Province under Grant No 13IRTSTHN020
文摘Measurement-device-independent quantum key distribution (MDI-QKD) is proven to be immune to all the de- tector side channel attacks. With two symmetric quantum channels, the maximal transmission distance can be doubled when compared with the prepare-and-measure QKD. An interesting question is whether the transmission distance can be extended further. In this work, we consider the contributions of the two-way local operations and classical communications to the key generation rate and transmission distance of the MDI-QKD. Our numerical results show that the secure transmission distances are increased by about 12kin and 8 km when the 1 13 and the 2 B steps are implemented, respectively.
基金Supported by the National Natural Science Foundation of China under Grant Nos 11304391,11674397 and 61671455the Program for New Century Excellent Talents in University of China
文摘Measurement-device-independent quantum key distribution (MDI-QKD) eliminates all loopholes on detection. 3 loss in the final key for the Previous experiments of time-bin phase-encoding MDI-QKD allow a factor of incapability of identifying two successive detection events by a single photon detector. Here we propose a new scheme to realize the time-bin phase-encoding MDI-QKD. The polarization states are used to generate the time bins and the phase-encoding states. The factor of loss in the final key is eliminated by using four single photon detectors at the measurement site. We show the feasibility of our scheme with a proof-of-principle experimental demonstration. The phase reference frame is rotated extremely slowly with only passive stabilization measures. The quantum bit error rate can reach 0.8% in the Z-basis and 26.2% in the X-basis.
基金Project supported by the National Natural Science Foundation of China(Grant No.61505261).
文摘The effects of weather conditions are ubiquitous in practical wireless quantum communication links.Here in this work,the performances of atmospheric continuous-variable measurement-device-independent quantum key distribution(CV-MDI-QKD)under diverse weather conditions are analyzed quantitatively.According to the Mie scattering theory and atmospheric CV-MDI-QKD model,we numerically simulate the relationship between performance of CV-MDI-QKD and the rainy and foggy conditions,aiming to get close to the actual combat environment in the future.The results show that both rain and fog will degrade the performance of the CV-MDI-QKD protocol.Under the rainy condition,the larger the raindrop diameter,the more obvious the extinction effect is and the lower the secret key rate accordingly.In addition,we find that the secret key rate decreases with the increase of spot deflection distance and the fluctuation of deflection.Under the foggy condition,the results illustrate that the transmittance decreases with the increase of droplet radius or deflection distance,which eventually yields the decrease in the secret key rate.Besides,in both weather conditions,the increase of transmission distance also leads the secret key rate to deteriorate.Our work can provide a foundation for evaluating the performance evaluation and successfully implementing the atmospheric CV-MDI-QKD in the future field operation environment under different weather conditions.
基金Project supported by the National Natural Science Foundation of China(Grant No.62001383)the Scientific Research Plan Project of Shaanxi Education Department(Natural Science Special Project)(Grant No.19JK0847).
文摘We propose a new scheme to enhance the performance of the Gussian-modulated coherent-state continuous-variable measurement-device-independent quantum key distribution(CV-MDI-QKD)system via quantum scissors(QS)operation at Bob's side.As an non-deterministic amplifying setup,we firstly introduce the QS-enhanced CV-MDI-QKD protocol and then investigate the success probability of the QS operation in accordance with the equivalent one-way scheme.Afterwards,we investigate the effect of the QS operation on the proposed scheme and analyze the performance of the QS-enhanced CV-MDI-QKD system under the extreme asymmetric circumstance.Simulation results show that the QS operation can indeed improve the performance of the CV-MDI-QKD system considerably.QS-enhanced CV-MDI-QKD protocol outperforms the original CV-MDI-QKD protocol in both the maximum transmission distance and the secret key rate.Moreover,the better the performance of QS operation,the more significant the improvement of performance of the system.
基金Project supported by Natural Science Foundation of Jiangsu Province(Grant Nos.BE2022071 and BK20192001)the National Natural Science Foundation of China(Grant Nos.12074194,62101285,62471248,and 12104240)Postgraduate Research&Practice Innovation Program of Jiangsu Province(Grant No.KYCX220954).
文摘In principle,the asynchronous measurement-device-independent quantum key distribution(AMDI-QKD)can surpass the key rate capacity without phase tracking and phase locking.However,practical imperfections in sources or detections would dramatically depress its performance.Here,we present an improved model on AMDI-QKD to reduce the influence of these imperfections,including intensity fluctuation,the afterpulse effect,and the dead time of detectors.Furthermore,we carry out corresponding numerical simulations.Simulation results show that,by implementing our present work,it can have more than 100 km longer secure transmission distance and one order of magnitude enhancement in the key generation rate after 320 km compared with the standard method.Moreover,our model can still break the Pirandola–Laurenza–Ottaviani–Banchi(PLOB)bound even under realistic experimental conditions.
基金Project supported by the National Natural Science Foundation of China(Grant Nos.61271238 and 61475075)the Specialized Research Fund for the Doctoral Program of Higher Education of China(Grant No.20123223110003)+7 种基金the Natural Science Research Foundation for Universities of Jiangsu Province of China(Grant No.11KJA510002)the Open Research Fund of Key Laboratory of Broadband Wireless Communication and Sensor Network TechnologyMinistry of EducationChina(Grant No.NYKL2015011)the Innovation Program of Graduate Education of Jiangsu ProvinceChina(Grant No.KYLX0810)partially supported by Qinglan Project of Jiangsu ProvinceChina
文摘In this paper, we propose a measurement-device-independent quantum-key-distribution(MDI-QKD) protocol using orbital angular momentum(OAM) in free space links, named the OAM-MDI-QKD protocol. In the proposed protocol,the OAM states of photons, instead of polarization states, are used as the information carriers to avoid the reference frame alignment, the decoy-state is adopted to overcome the security loophole caused by the weak coherent pulse source, and the high efficient OAM-sorter is adopted as the measurement tool for Charlie to obtain the output OAM state. Here, Charlie may be an untrusted third party. The results show that the authorized users, Alice and Bob, could distill a secret key with Charlie's successful measurements, and the key generation performance is slightly better than that of the polarization-based MDI-QKD protocol in the two-dimensional OAM cases. Simultaneously, Alice and Bob can reduce the number of flipping the bits in the secure key distillation. It is indicated that a higher key generation rate performance could be obtained by a high dimensional OAM-MDI-QKD protocol because of the unlimited degree of freedom on OAM states. Moreover,the results show that the key generation rate and the transmission distance will decrease as the growth of the strength of atmospheric turbulence(AT) and the link attenuation. In addition, the decoy states used in the proposed protocol can get a considerable good performance without the need for an ideal source.
基金supported by the National Natural Science Foundation of China under Grant Nos.11974189,12005106the Postgraduate Research&Practice Innovation Program of Jiangsu Province under Grant No.SJCX19-0241a Project Funded by the Priority Academic Program Development of Jiangsu Higher Education Institutions.
文摘Measurement-device-independent quantum key distribution(MDI-QKD)provides us a powerful approach to resist all attacks at detection side.Besides the unconditional security,people also seek for high key generation rate,but MDI-QKD has relatively low key generation rate.In this paper,we provide an efficient approach to increase the key generation rate of MDI-QKD by adopting multiple degrees of freedom(DOFs)of single photons to generate keys.Compared with other high-dimension MDI-QKD protocols encoding in one DOF,our protocol is more flexible,for our protocol generating keys in independent subsystems and the detection failure or error in a DOF not affecting the information encoding in other DOFs.Based on above features,our MDI-QKD protocol may have potential application in future quantum comniunication field.
基金Supported by the National Key Research and Development Program of China under Grant Nos.2018YFA0306400,2017YFA0304100the National Natural Science Foundation of China under Grants Nos.61475197,61590932,11774180,61705110+3 种基金the Natural Science Foundation of the Jiangsu Higher Education Institutions under Grant Nos.15KJA120002,17KJB140016the Outstanding Youth Project of Jiangsu Province through Grant No.BK20150039the Natural Science Foundation of Jiangsu Province under Grant No.BK20170902the Postgraduate Research and Practice Innovation Program of Jiangsu Province
文摘Statistical fluctuations are unavoidable in realistic quantum key distribution (QKD) due to finite-size effect. Based on the four-intensity proposal on measurement-device-independent QKD (MDI-QKD) in [Phys. Rev. A93 (2016) 042324], we particularly analyze the scenario that only three intensities are used, namely a three-intensity decoy-state MDI-QKD with biased basis choice. After performing full parameter optimization method, simulations results demonstrate that this scenario can obtain distinct enhancement compared with the conventional unbiased threeintensity decoy-state method, e.g. Xu et al.’s [Phys. Rev. A 89 (2014) 052333]. Furthermore, results also show that it works more efficiently by using HSPS than using WCS at longer transmission distance.
基金supported by the National Natural Science Foundation of China(Grant No.11974189)the China Postdoctoral Science Foundation(Grant No.2018M642293)+1 种基金the open research fund of Key Lab of Broadband Wireless Communication and Sensor Network Technology,Nanjing University of Posts and Telecommunications,Ministry of Education(Grant No.JZNY201908)a Project Funded by the Priority Academic Program Development of Jiangsu Higher Education Institutions
文摘Measurement device-independent quantum key distribution(MDI-QKD) protocols are immune to all possible attacks on the photon detectors during quantum communication, but their key generation rates are low compared with those of other QKD schemes.Increasing each individual photon’s channel capacity is an efficient way to increase the key generation rate, and high-dimensional(HD) encoding is a powerful tool for increasing the channel capacity of photons. In this paper, we propose an HD MDI-QKD protocol with qudits hyper-encoded in spatial mode and polarization degrees of freedom(DOFs). In the proposed protocol, keys can be generated using the spatial mode and polarization DOFs simultaneously. The proposed protocol is unconditionally secure,even for weak coherent pulses with decoy states. The proposed MDI-QKD protocol may be useful for future quantum secure communication applications.
文摘We propose a discrete-modulated continuous-variable measurement-device-independent quantum key distribution protocol over a fiber-to-water channel.Different from optical fibers,the underwater channel has more severe optical attenuation because of optical absorption and scattering,which reduces the maximum communication distance.To enhance the performance of the protocol,the photon subtraction operation is implemented at the modulator side.We carry out a performance simulation in two different kinds of seawater channel,and the result shows that the scheme with photon subtraction has a longer secure communication distance under certain conditions.
基金Supported by the National Basic Research Program of China under Grant No.2013CB338002the National Natural Science Foundation of China under Grant Nos.61505261,61675235,61605248,11304397
文摘Measurement-device-independent quantum key distribution(MDI-QKD) is immune to detector side channel attacks, which is a crucial security loophole problem in traditional QKD. In order to relax a key assumption that the sources are trusted in MDI-QKD, an MDI-QKD protocol with an untrusted source has been proposed. For the security of MDI-QKD with an untrusted source, imperfections in the practical experiment should also be taken into account. In this paper, we analyze the effects of fluctuations of internal transmittance on the security of a decoy-state MDI-QKD protocol with an untrusted source. Our numerical results show that both the secret key rate and the maximum secure transmission distance decrease when taken fluctuations of internal transmittance into consideration. Especially, they are more sensitive when Charlie's mean photon number per pulse is smaller. Our results emphasize that the stability of correlative optical devices is important for practical implementations.
基金Supported by the National Key Research and Development Program of China under Grant Nos.2018YFA0306400 and 2017YFA0304100the National Natural Science Foundation of China under Grant Nos.61475197,61590932,11774180,and 61705110+3 种基金the Natural Science Foundation of the Jiangsu Higher Education Institutions under Grant Nos.15KJA120002 and 17KJB140016the Natural Science Foundation of Jiangsu Province under Grant No.BK20170902the Outstanding Youth Project of Jiangsu under Grant No.BK20150039the Postgraduate Research&Practice Innovation Program of Jiangsu Province under Grant No.KYCX18 0906
文摘Reference-frame-independent measurement-device-independent QKD(RFI-MDI-QKD), immune to both the slow unknown drift of reference frames and detector side channel attacks, can generate information-theoretic secure keys. Despite its natural resistance to the slow drift of reference frames, the performance of practical RFI-MDI-QKD systems descends with the increasing drift of reference frames. In this paper, we demonstrate the worst relative rotation of reference frames for practical RFI-MDI-QKD systems, and investigate their performance against the worst-case scenario,both of which are unclear to date. Simulation results show that, practical RFI-MDI-QKD systems can achieve quite good performance even against the worst-case scenario, which clearly demonstrates that it is possible to implement practical MDI-QKD systems with freely drifting reference frames.
基金Supported by the National Basic Research Program of China under Grant Nos.2011CBA00200 and 2011CB921200the National Natural Science Foundation of China under Grant Nos.61475148,61575183the "Strategic Priority Research Program(B)" of the Chinese Academy of Sciences under Grant Nos.XDB01030100,XDB01030300
文摘Recently, a novel reference-frame-independent measurement-device-independent quantum key distribution protocol was proposed, which can remove all detector side channels as well as tolerate unknown and slow variance of reference frame without active alignment. In this paper, we propose a new tomographic method to estimate the key rate in that protocol. We estimate the key rate using conventional method and tomographic method respectively and compare the two methods by numerical simulation. The numerical simulation results show that tomographic approach is equivalent to the conventional approach, which can be used as an alternative method.
基金Project supported by the Natural Science Foundation of Jilin Province of China(Grant No.20210101417JC).
文摘Quantum key distribution(QKD)is a technology that can resist the threat of quantum computers to existing conventional cryptographic protocols.However,due to the stringent requirements of the quantum key generation environment,the generated quantum keys are considered valuable,and the slow key generation rate conflicts with the high-speed data transmission in traditional optical networks.In this paper,for the QKD network with a trusted relay,which is mainly based on point-to-point quantum keys and has complex changes in network resources,we aim to allocate resources reasonably for data packet distribution.Firstly,we formulate a linear programming constraint model for the key resource allocation(KRA)problem based on the time-slot scheduling.Secondly,we propose a new scheduling scheme based on the graded key security requirements(GKSR)and a new micro-log key storage algorithm for effective storage and management of key resources.Finally,we propose a key resource consumption(KRC)routing optimization algorithm to properly allocate time slots,routes,and key resources.Simulation results show that the proposed scheme significantly improves the key distribution success rate and key resource utilization rate,among others.
基金Project supported by the National Natural Science Foundation of China (Grant Nos.61505261,62101597,61605248,and 61675235)the National Key Research and Development Program of China (Grant No.2020YFA0309702)+2 种基金the China Postdoctoral Science Foundation (Grant No.2021M691536)the Natural Science Foundation of Henan Province,China (Grant Nos.202300410534 and 202300410532)the Fund of the Anhui Initiative in Quantum Information Technologies。
文摘The reference-frame-independent(RFI)quantum key distribution(QKD)is suitable for satellite-based links by removing the active alignment on the reference frames.However,how the beam wandering influences the performance of RFI-QKD remains a pending issue in satellite-to-ground links.In this paper,based on the mathematical model for characterizing beam wandering,we present the security analysis for satellite-to-ground RFI-QKD and analytically derive formulas for calculating the secret key rate with beam wandering.Our simulation results show that the performance of RFI-QKD is better than the Bennett–Brassard 1984(BB84)QKD with beam wandering in asymptotic case.Furthermore,the degree of influences of beam wandering is specifically presented for satellite-to-ground RFI-QKD when statistical fluctuations are taken into account.Our work can provide theoretical support for the realization of RFI-QKD using satellite-to-ground links and have implications for the construction of large-scale satellite-based quantum networks.
基金supported by the National Natural Science Foundation of China(Grant Nos.61505261,62101597,61605248,and 61675235)the National Key Research and Development Program of China(Grant No.2020YFA0309702)+2 种基金the China Postdoctoral Science Foundation(Grant No.2021M691536)the Natural Science Foundation of Henan Province(Grant Nos.202300410534 and 202300410532)the Anhui Initiative in Quantum Information Technologies.
文摘The data post-processing scheme based on two-way classical communication(TWCC)can improve the tolerable bit error rate and extend the maximal transmission distance when used in a quantum key distribution(QKD)system.In this study,we apply the TWCC method to improve the performance of reference-frame-independent quantum key distribution(RFI-QKD),and analyze the influence of the TWCC method on the performance of decoy-state RFI-QKD in both asymptotic and non-asymptotic cases.Our numerical simulation results show that the TWCC method is able to extend the maximal transmission distance from 175 km to 198 km and improve the tolerable bit error rate from 10.48%to 16.75%.At the same time,the performance of RFI-QKD in terms of the secret key rate and maximum transmission distance are still greatly improved when statistical fluctuations are considered.We conclude that RFI-QKD with the TWCC method is of practical interest.
基金Project supported by the National Natural Science Foundation of China(Grant Nos.12074194,12104240,and 62101285)the Industrial Prospect and Key Core Technology Projects of Jiangsu Provincial Key Research and Development Program(Grant No.BE2022071)the Natural Science Foundation of Jiangsu Province,China(Grant Nos.BK20192001 and BK20210582).
文摘Encoding system plays a significant role in quantum key distribution(QKD).However,the security and performance of QKD systems can be compromised by encoding misalignment due to the inevitable defects in realistic devices.To alleviate the influence of misalignments,a method exploiting statistics from mismatched basis is proposed to enable uncharacterized sources to generate secure keys in QKD.In this work,we propose a scheme on four-intensity decoy-state quantum key distribution with uncharacterized heralded single-photon sources.It only requires the source states are prepared in a two-dimensional Hilbert space,and can thus reduce the complexity of practical realizations.Moreover,we carry out corresponding numerical simulations and demonstrate that our present four-intensity decoy-state scheme can achieve a much higher key rate compared than a three-intensity decoy-state method,and meantime it can obtain a longer transmission distance compared than the one using weak coherent sources.
基金This work was supported by the Major Scientific and Technological Special Project of Anhui Province(202103a13010004)the Major Scientific and Technological Special Project of Hefei City(2021DX007)+1 种基金the Key R&D Plan of Shandong Province(2020CXGC010105)the China Postdoctoral Science Foundation(2021M700315).
文摘Quantum key distribution(QKD),rooted in quantum mechanics,offers information-theoretic security.However,practi-cal systems open security threats due to imperfections,notably bright-light blinding attacks targeting single-photon detectors.Here,we propose a concise,robust defense strategy for protecting single-photon detectors in QKD systems against blinding attacks.Our strategy uses a dual approach:detecting the bias current of the avalanche photodiode(APD)to defend against con-tinuous-wave blinding attacks,and monitoring the avalanche amplitude to protect against pulsed blinding attacks.By integrat-ing these two branches,the proposed solution effectively identifies and mitigates a wide range of bright light injection attempts,significantly enhancing the resilience of QKD systems against various bright-light blinding attacks.This method forti-fies the safeguards of quantum communications and offers a crucial contribution to the field of quantum information security.
基金the Research on Key Technology and Equipment Development of Autonomous and Controllable Lightweight Endogenous Safety of Power Monitoring System(Grant No.5108-202118056A-0-0-00).
文摘Quantum key distribution(QKD)in principle can provide unconditional secure communication between distant parts.However,when finite-key length is taken into account,the security can only be ensured within certain security level.In this paper,we adopt the Chernoff bound analysis method to deal with finite-key-size effects,carrying out corresponding investigations on the relationship between the key generation rate and security parameters for different protocols,including BB84,measurement-device-independent and twin-field QKD protocols.Simulation results show that there exists a fundamental limit between the key rate and the security parameters.Therefore,this study can provide valuable references for practical application of QKD,getting a nice balance between the key generation rate and the security level.