Security of continuous-variable measurement-device-independent quantum key distribution with imperfect state preparation |
| |
Authors: | Hong-Xin Ma Peng Huang Tao Wang Shi-Yu Wang Wan-Su Bao Gui-Hua Zeng |
| |
Affiliation: | 1. Henan Key Laboratory of Quantum Information and Cryptography, Zhengzhou Information Science and Technology Institute, Zhengzhou, Henan 450001, China;2. Synergetic Innovation Center of Quantum Information and Quantum Physics, University of Science and Technology of China, Hefei, Anhui 230026, China;3. State Key Laboratory of Advanced Optical Communication Systems and Networks and Center of Quantum Information Sensing and Processing, Shanghai Jiao Tong University, Shanghai 200240, China |
| |
Abstract: | The state preparation operation of continuous-variable measurement-device-independent quantum key distribution (CV-MDI-QKD) protocol may become imperfect in practical applications. We address the security of the CV-MDI-QKD protocol based on imperfect preparation of the coherent state under realistic conditions of lossy and noisy quantum channel. Specifically, we assume that the imperfection of Alice's and Bob's practical state preparations equal to the amplification of ideal modulators and lasers at both Alice's and Bob's sides by untrusted third-parties Fred and Gray employing phase-insensitive amplifiers (PIAs), respectively. The equivalent excess noise introduced by the imperfect state preparation is comprehensively and quantitatively calculated by adopting the gains of PIAs. Security analysis shows that CV-MDI-QKD is quite sensitive to the imperfection of practical state preparation, which inevitably deteriorates the performance and security of CV-MDI-QKD system. Moreover, a lower bound of the secret key rate is derived under arbitrary collective attacks, and the upper threshold of this imperfection tolerated by the system is obtained in the form of the specific gains of PIAs. In addition, the methods presented will improve and perfect the practical security of CV-MDI-QKD protocol. |
| |
Keywords: | Corresponding author. Quantum key distribution Measurement-device-independent Continuous-variable Imperfect state preparation Practical security |
本文献已被 ScienceDirect 等数据库收录! |
|