Security analysis of an untrusted source for quantum key distribution: passive approach
Open Access
- 1 February 2010
- journal article
- Published by IOP Publishing in New Journal of Physics
Abstract
We present a passive approach to the security analysis of quantum key distribution (QKD) with an untrusted source. A complete proof of its unconditional security is also presented. This scheme has significant advantages in real-life implementations as it does not require fast optical switching or a quantum random number generator. The essential idea is to use a beam splitter to split each input pulse. We show that we can characterize the source using a cross-estimate technique without active routing of each pulse. We have derived analytical expressions for the passive estimation scheme. Moreover, using simulations, we have considered four real-life imperfections: Additional loss introduced by the "plug & play" structure, inefficiency of the intensity monitor, noise of the intensity monitor, and statistical fluctuation introduced by finite data size. Our simulation results show that the passive estimate of an untrusted source remains useful in practice, despite these four imperfections. Also, we have performed preliminary experiments, confirming the utility of our proposal in real-life applications. Our proposal makes it possible to implement the "plug & play" QKD with the security guaranteed, while keeping the implementation practical.Keywords
Other Versions
This publication has 31 references indexed in Scilit:
- Quantum Cryptography with Finite Resources: Unconditional Security Bound for Discrete-Variable Protocols with One-Way PostprocessingPhysical Review Letters, 2008
- Upper bounds of eavesdropper’s performances in finite-length code with the decoy methodPhysical Review A, 2007
- Quantum key distribution over a 40-dB channel loss using superconducting single-photon detectorsNature Photonics, 2007
- Practical decoy state for quantum key distributionPhysical Review A, 2005
- Decoy State Quantum Key DistributionPhysical Review Letters, 2005
- Beating the Photon-Number-Splitting Attack in Practical Quantum CryptographyPhysical Review Letters, 2005
- Quantum key distribution over 122 km of standard telecom fiberApplied Physics Letters, 2004
- Quantum key distribution over 67 km with a plug&play systemNew Journal of Physics, 2002
- Unconditional Security of Quantum Key Distribution over Arbitrarily Long DistancesScience, 1999
- Über den zentralen Grenzwertsatz der Wahrscheinlichkeitsrechnung und das MomentenproblemMathematische Zeitschrift, 1920