skip to main content
OSTI.GOV title logo U.S. Department of Energy
Office of Scientific and Technical Information

Title: Finite-key security analysis of quantum key distribution with imperfect light sources

Journal Article · · New Journal of Physics
 [1];  [2];  [3];  [1];  [4]
  1. Osaka Univ. (Japan)
  2. Univ. of Vigo (Spain)
  3. Univ. of Geneva (Switzerland); Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)
  4. Nippon Telegraph and Telephone (NTT) Corporation, Japan

In recent years, the gap between theory and practice in quantum key distribution (QKD) has been significantly narrowed, particularly for QKD systems with arbitrarily flawed optical receivers. The status for QKD systems with imperfect light sources is however less satisfactory, in the sense that the resulting secure key rates are often overly dependent on the quality of state preparation. This is especially the case when the channel loss is high. Very recently, to overcome this limitation, Tamaki et al proposed a QKD protocol based on the so-called 'rejected data analysis', and showed that its security in the limit of infinitely long keys is almost independent of any encoding flaw in the qubit space, being this protocol compatible with the decoy state method. Here, as a step towards practical QKD, we show that a similar conclusion is reached in the finite-key regime, even when the intensity of the light source is unstable. More concretely, we derive security bounds for a wide class of realistic light sources and show that the bounds are also efficient in the presence of high channel loss. Our results strongly suggest the feasibility of long distance provably secure communication with imperfect light sources.

Research Organization:
Oak Ridge National Laboratory (ORNL), Oak Ridge, TN (United States)
Sponsoring Organization:
USDOE
Grant/Contract Number:
AC05-00OR22725
OSTI ID:
1265669
Journal Information:
New Journal of Physics, Vol. 17, Issue 9; ISSN 1367-2630
Publisher:
IOP PublishingCopyright Statement
Country of Publication:
United States
Language:
English
Citation Metrics:
Cited by: 40 works
Citation information provided by
Web of Science

References (51)

Laser Damage Helps the Eavesdropper in Quantum Cryptography journal February 2014
Random Variation of Detector Efficiency: A Countermeasure Against Detector Blinding Attacks for Quantum Key Distribution journal May 2015
Phase encoding schemes for measurement-device-independent quantum key distribution with basis-dependent flaw journal April 2012
Unconditional Security of Quantum Key Distribution over Arbitrarily Long Distances journal March 1999
Device Calibration Impacts Security of Quantum Key Distribution journal September 2011
Preventing calibration attacks on the local oscillator in continuous-variable quantum key distribution journal June 2013
High-rate measurement-device-independent quantum cryptography journal May 2015
Proof-of-principle demonstration of measurement-device-independent quantum key distribution using polarization qubits journal November 2013
Measurement-device-independent quantum key distribution for Scarani-Acin-Ribordy-Gisin 04 protocol journal June 2014
Quantum key distribution with an unknown and untrusted source journal May 2008
Statistical fluctuation analysis for measurement-device-independent quantum key distribution journal November 2012
Probability Inequalities for Sums of Bounded Random Variables journal March 1963
Simple Proof of Security of the BB84 Quantum Key Distribution Protocol journal July 2000
Three-intensity decoy-state method for device-independent quantum key distribution with basis-dependent errors journal January 2013
Continuous-variable measurement-device-independent quantum key distribution journal May 2014
General theory of decoy-state quantum cryptography with source errors journal April 2008
Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems journal October 2008
Composability in quantum cryptography journal August 2009
Weighted sums of certain dependent random variables journal January 1967
Continuous-variable quantum cryptography with an untrusted relay: Detailed security analysis of the symmetric configuration journal February 2015
Concise security bounds for practical decoy-state quantum key distribution journal February 2014
Provably secure and practical quantum key distribution over 307 km of optical fibre journal February 2015
Lower and Upper Bounds on the Secret-Key Rate for Quantum Key Distribution Protocols Using One-Way Classical Communication journal August 2005
Experimental Demonstration of Polarization Encoding Measurement-Device-Independent Quantum Key Distribution journal May 2014
Concise and tight security analysis of the Bennett–Brassard 1984 protocol with finite key lengths journal September 2012
The Universal Composable Security of Quantum Key Distribution book January 2005
Simple security proof of quantum key distribution based on complementarity journal April 2009
Quantum Key Distribution with High Loss: Toward Global Secure Communication journal August 2003
Reexamination of the decoy-state quantum key distribution with an unstable source journal July 2010
Passive-scheme analysis for solving the untrusted source problem in quantum key distribution journal April 2010
Hacking commercial quantum cryptography systems by tailored bright illumination journal August 2010
Experimental quantum-key distribution with an untrusted source journal January 2008
Unconditional Security of a Three State Quantum Key Distribution Protocol journal January 2005
Decoy State Quantum Key Distribution journal June 2005
Beating the Photon-Number-Splitting Attack in Practical Quantum Cryptography journal June 2005
Tight finite-key analysis for quantum cryptography journal January 2012
Security analysis of an untrusted source for quantum key distribution: passive approach journal February 2010
Quantum eavesdropping without interception: an attack exploiting the dead time of single-photon detectors journal July 2011
Long distance measurement-device-independent quantum key distribution with entangled photon sources journal August 2013
A Measure of Asymptotic Efficiency for Tests of a Hypothesis Based on the sum of Observations journal December 1952
Real-World Two-Photon Interference and Proof-of-Principle Quantum Key Distribution Immune to Detector Attacks journal September 2013
Loss-tolerant quantum cryptography with imperfect sources journal November 2014
Experimental Measurement-Device-Independent Quantum Key Distribution journal September 2013
Quantum cryptography journal March 2002
Secure quantum key distribution journal July 2014
Measurement-Device-Independent Quantum Key Distribution journal March 2012
The security of practical quantum key distribution journal September 2009
Security analysis of the decoy method with the Bennett–Brassard 1984 protocol for finite key lengths journal June 2014
Finite-key analysis for measurement-device-independent quantum key distribution journal April 2014
Unconditional security of the Bennett 1992 quantum-key-distribution scheme with a strong reference pulse journal September 2009
Security of quantum key distribution with imperfect devices journal September 2004

Cited By (13)

Critical side channel effects in random bit generation with multiple semiconductor lasers in a polarization-based quantum key distribution system text January 2017
Characterizing multi-photon quantum interference with practical light sources and threshold single-photon detectors journal April 2018
Metropolitan Quantum Key Distribution with Silicon Photonics journal April 2018
Laser-seeding Attack in Quantum Key Distribution journal December 2019
Secure quantum key distribution over 421 km of optical fiber text January 2018
Simple security proof of twin-field type quantum key distribution protocol journal July 2019
Characterizing multi-photon quantum interference with practical light sources and threshold single-photon detectors text January 2017
Metropolitan quantum key distribution with silicon photonics text January 2017
Implementation Security Certification of Decoy‐BB84 Quantum Key Distribution Systems journal April 2019
Practical challenges in quantum key distribution journal November 2016
Security of BB84 with weak randomness and imperfect qubit encoding journal January 2018
Simple 2.5 GHz time-bin quantum key distribution journal April 2018
How Secure Are Two-Way Ping-Pong and LM05 QKD Protocols under a Man-in-the-Middle Attack? text January 2021

Similar Records

Security proof of a three-state quantum-key-distribution protocol without rotational symmetry
Journal Article · Sun Oct 15 00:00:00 EDT 2006 · Physical Review. A · OSTI ID:1265669

NuQKD: A Modular Quantum Key Distribution Simulation Framework for Engineering Applications
Journal Article · Fri Mar 29 00:00:00 EDT 2024 · Advanced Physics Research · OSTI ID:1265669

Long-distance quantum key distribution with imperfect devices
Journal Article · Thu Dec 04 00:00:00 EST 2014 · AIP Conference Proceedings · OSTI ID:1265669