scholarly journals Security Analysis on Measurement-Device-Independent Quantum Key Distribution Protocol

2017 ◽  
Vol 07 (06) ◽  
pp. 257-268
Author(s):  
宏欣 李
2019 ◽  
Vol 99 (6) ◽  
Author(s):  
Ignatius William Primaatmaja ◽  
Emilien Lavie ◽  
Koon Tong Goh ◽  
Chao Wang ◽  
Charles Ci Wen Lim

2014 ◽  
Vol 945-949 ◽  
pp. 2277-2283 ◽  
Author(s):  
Tao Yu ◽  
Hui Yao An ◽  
Dun Wei Liu

It is known that practical quantum key distribution system, because of the imperfect of devices, has sort of loopholes, so Eve can attack through these loopholes. The proposition of measurement device independent quantum key distribution protocol claimed to solve all the loopholes at the detector side. However the proof of MDI-QKD is based on the Hong-Ou-Mandel effect at 50:50 beam splitter. And with current experimental technology, a realistic beam splitter, made by fused biconical technology, has a wavelength-dependent property. Based on this fatal security loophole, the author propose a wavelength-dependent attacking protocol, which can be applied to practical MDI-QKD systems. Through this attacking protocol the author theoretical estimated that the eavesdropper could get 70% of the encoding information with a QBER of only 0.04.


2021 ◽  
Vol 11 (1) ◽  
Author(s):  
Weilong Wang ◽  
Kiyoshi Tamaki ◽  
Marcos Curty

AbstractMeasurement-device-independent quantum key distribution (MDI-QKD) can remove all detection side-channels from quantum communication systems. The security proofs require, however, that certain assumptions on the sources are satisfied. This includes, for instance, the requirement that there is no information leakage from the transmitters of the senders, which unfortunately is very difficult to guarantee in practice. In this paper we relax this unrealistic assumption by presenting a general formalism to prove the security of MDI-QKD with leaky sources. With this formalism, we analyze the finite-key security of two prominent MDI-QKD schemes—a symmetric three-intensity decoy-state MDI-QKD protocol and a four-intensity decoy-state MDI-QKD protocol—and determine their robustness against information leakage from both the intensity modulator and the phase modulator of the transmitters. Our work shows that MDI-QKD is feasible within a reasonable time frame of signal transmission given that the sources are sufficiently isolated. Thus, it provides an essential reference for experimentalists to ensure the security of implementations of MDI-QKD in the presence of information leakage.


Sign in / Sign up

Export Citation Format

Share Document