TY - JOUR
T1 - Decoy-state quantum key distribution with a leaky source
AU - Tamaki, Kiyoshi
AU - Curty, Marcos
AU - Lucamarini, Marco
N1 - Publisher Copyright:
© 2016 IOP Publishing Ltd and Deutsche Physikalische Gesellschaft.
PY - 2016/6
Y1 - 2016/6
N2 - In recent years, there has been a great effort to prove the security of quantum key distribution (QKD) with a minimum number of assumptions. Besides its intrinsic theoretical interest, this would allow for larger tolerance against device imperfections in the actual implementations. However, even in this device-independent scenario, one assumption seems unavoidable, that is, the presence of a protected space devoid of any unwanted information leakage in which the legitimate parties can privately generate, process and store their classical data. In this paper we relax this unrealistic and hardly feasible assumption and introduce a general formalism to tackle the information leakage problem in most of existing QKD systems. More specifically, we prove the security of optical QKD systems using phase and intensity modulators in their transmitters, which leak the setting information in an arbitrary manner. We apply our security proof to cases of practical interest and show key rates similar to those obtained in a perfectly shielded environment. Our work constitutes a fundamental step forward in guaranteeing implementation security of quantum communication systems.
AB - In recent years, there has been a great effort to prove the security of quantum key distribution (QKD) with a minimum number of assumptions. Besides its intrinsic theoretical interest, this would allow for larger tolerance against device imperfections in the actual implementations. However, even in this device-independent scenario, one assumption seems unavoidable, that is, the presence of a protected space devoid of any unwanted information leakage in which the legitimate parties can privately generate, process and store their classical data. In this paper we relax this unrealistic and hardly feasible assumption and introduce a general formalism to tackle the information leakage problem in most of existing QKD systems. More specifically, we prove the security of optical QKD systems using phase and intensity modulators in their transmitters, which leak the setting information in an arbitrary manner. We apply our security proof to cases of practical interest and show key rates similar to those obtained in a perfectly shielded environment. Our work constitutes a fundamental step forward in guaranteeing implementation security of quantum communication systems.
KW - Trojan horse attacks
KW - device-independent quantum key distribution
KW - information leakage
KW - quantum communication
KW - quantum key distribution
KW - security analysis
UR - http://www.scopus.com/inward/record.url?scp=84976871480&partnerID=8YFLogxK
U2 - 10.1088/1367-2630/18/6/065008
DO - 10.1088/1367-2630/18/6/065008
M3 - 学術論文
AN - SCOPUS:84976871480
SN - 1367-2630
VL - 18
JO - New Journal of Physics
JF - New Journal of Physics
IS - 6
M1 - 065008
ER -