| Literature DB >> 33285811 |
Yucheng Qiao1, Ziyang Chen1, Yichen Zhang2, Bingjie Xu3, Hong Guo1.
Abstract
Twin-field quantum key distribution (TF-QKD) is proposed to achieve a remote key distribution with a maximum secure transmission distance up to over 500 km. Although the security of TF-QKD in its detection part is guaranteed, there are some remaining problems in the source part. The sending-or-not-sending (SNS) protocol is proposed to solve the security problem in the phase post-selection process; however, the light source is still assumed to be an ideal coherent state. This assumption is not satisfied in real-life QKD systems, leading to practical secure issues. In this paper, we discuss the condition that the photon number distribution (PND) of the source is unknown for the SNS protocol, demonstrate that the security analysis is still valid under a source with unknown PND, and show that with light source monitoring, the performance of the SNS protocol can remain almost unchanged.Entities:
Keywords: light source monitoring; quantum key distribution; sending-or-not-sending; twin-fields
Year: 2019 PMID: 33285811 PMCID: PMC7516458 DOI: 10.3390/e22010036
Source DB: PubMed Journal: Entropy (Basel) ISSN: 1099-4300 Impact factor: 2.524
Figure 1The structure of the sending-or-not-sending (SNS) protocol with an extra LSM module in each of Alice’s and Bob’s parts. The LSM module is made up of a variable optical attenuators (VOA) and a single photon detector (SPD). By changing the attenuation coefficient of the VOA, various sets of the results on the responding probability of the SPD are obtained, which can be used to estimate effectively. The details of the monitoring scheme have been discussed in Reference [38].
Values of parameters used in simulation. : the fiber loss coefficient (unit: dB/km); : the dark count rate of the detector; : the detection efficiency; : the misalignment error of the QKD system; f: the error correction efficiency.
|
|
|
|
|
|
|---|---|---|---|---|
|
|
|
|
|
|
Figure 2The performance of the proposed LSM scheme (red dash curve) compared to original SNS protocol (blue dash curve) with the parameters set as Table 1. The ratios of secret key rate between the LSM scheme and original SNS protocol are about at the distance of km, and the maximum transmission distances of the LSM scheme and original SNS protocol are about and km.
Values of parameters used in simulation (set as in Reference [21] for a more practical condition).
|
|
|
|
|
|
|---|---|---|---|---|
|
|
|
|
|
|
Figure 3The performance of the LSM scheme with an untrusted and fluctuated light source compared to original SNS protocol. : the fluctuation coefficient. For the LSM scheme, we consider a small fluctuation condition (black dash curve) and a large fluctuation condition (red dash curve), and the performance between them is still close. For the original protocol, we consider a small fluctuation condition (blue curve) and a relatively large fluctuation condition (yellow curve), since the condition already has an obviously worse performance than .