| Literature DB >> 31745131 |
Hua-Lei Yin1, Zeng-Bing Chen2.
Abstract
Long-distance quantum key distribution (QKD) has long time seriously relied on trusted relay or quantum repeater, which either has security threat or is far from practical implementation. Recently, a solution called twin-field (TF) QKD and its variants have been proposed to overcome this challenge. However, most security proofs are complicated, a majority of which could only ensure security against collective attacks. Until now, the full and simple security proof can only be provided with asymptotic resource assumption. Here, we provide a composable finite-key analysis for coherent-state-based TF-QKD with rigorous security proof against general attacks. Furthermore, we develop the optimal statistical fluctuation analysis method to significantly improve secret key rate in high-loss regime. The results show that coherent-state-based TF-QKD is practical and feasible, with the potential to apply over nearly one thousand kilometers.Entities:
Year: 2019 PMID: 31745131 PMCID: PMC6863895 DOI: 10.1038/s41598-019-53435-4
Source DB: PubMed Journal: Sci Rep ISSN: 2045-2322 Impact factor: 4.379
Figure 1The setup of coherent-state-based TF-QKD. For Protocol 1 (2), Alice and Bob prepare coherent states if choosing Z basis and cat states (PRCS) if choosing X basis. They send the prepared quantum signals through insecure channel to the untrusted Charlie, who is supposed to perform an entangled coherent state measurement. As an example, Charlie let the two received optical pulses interfere at a symmetric beam splitter (BS), which has on each end a threshold single-photon detector. A click in the single-photon detector L implies a projection into the entangled coherent state , while a click in single-photon detector R indicates a projection into the entangled coherent state . Details can be found in main text.
Post-processing of raw key in the sifting step.
| Measurement results of Charlie | ||||
|---|---|---|---|---|
| Protocol 1 | Protocol 2 | |||
| Alice & Bob | ||||
| Z basis | No flip | Flip | No flip | Flip |
| X basis | Flip | Flip | — | — |
Bob will decide whether he implements a key bit flip to guarantee correct correlations, depending on the announced entangled coherent state and the selected basis. Note that there is no key bit in the X basis for Protocol 2.
Figure 2Expected key rate as function of the distance. (a,b) Secret key rate in logarithmic scale for Protocol 1 (2) as a function of the fibre distance. The colour lines correspond to different values for the total number of signals N sent by Alice and Bob. In comparison, the black line represents the repeaterless PLOB bound. For simulation, we consider the following parameters: the loss coefficient of the fibre channel is 0.16 dB/km, the detection efficiency and dark count rate are 85% and 10−11. The overall misalignment rate in the channel is set to 2%, and the security bound of secrecy is . The results show clearly that the secret key rates of coherent-state-based TF-QKD in Protocols 1 and 2 can break the repeaterless PLOB bound even with a small finite size of data, say N = 108 for Protocol 1 and 1010 for Protocol 2. The maximum transmission distance of Protocols 1 and 2 are more than 1000 km and 800 km with the realistic finite size of data N = 1013.
Figure 3Expected key rate as function of the block size. (a) Protocol 1. (b) Protocol 2. The plot shows the secret key rate in logarithmic scale as a function of the total number of signals N sent by Alice and Bob in the transmission distance of 500 km. The security bound of secrecy . The colour solid lines correspond to different values for the overall misalignment rate. The colour dotted lines show the corresponding asymptotic rates[28]. In comparison, the black line represents the PLOB bound given by the transmission distance of 500 km. The results show that the coherent-state-based TF-QKD is robust to the large misalignment rate even for a finite size of signals sent by Alice and Bob.