论文标题

与检测效率不匹配的实用量子密钥分布的安全证明

Security proof of practical quantum key distribution with detection-efficiency mismatch

论文作者

Zhang, Yanbao, Coles, Patrick J., Winick, Adam, Lin, Jie, Lutkenhaus, Norbert

论文摘要

带有阈值检测器的量子密钥分布(QKD)方案正在推动高性能QKD示范。相应的安全性证明通常假定所有物理检测器都具有相同的检测效率。但是,实践中使用的检测器的效率可能会显示出不匹配的,具体取决于这些探测器的制造和设置。不匹配也可以引起,因为传入信号的不同时空模式可能与检测器不同。在这里,我们开发了一种允许在没有通常假设的情况下提供安全证明的方法。我们的方法可以考虑到检测效率不匹配,而不必限制对手的攻击策略。特别是,我们不依赖任何传入信号的光子数截止,因此我们的安全证明直接适用于实际情况。我们说明了用于极化编码的接收器的方法,并且对许多时空模式敏感。在我们的探测器模型中,假定任何一对时空模式之间没有量子干扰。对于具有此检测器模型的QKD协议,我们可以执行具有特征性效率不匹配的安全性证明,并且没有光子数截止的假设。我们的方法还表明,在我们的检测器模型中没有效率不匹配的情况下,如果假定由于检测效率低效率而导致的损失不在对手的控制之外,那么关键率会增加,而与对安全性证据的看法相比,此损失归因于对手的作用。

Quantum key distribution (QKD) protocols with threshold detectors are driving high-performance QKD demonstrations. The corresponding security proofs usually assume that all physical detectors have the same detection efficiency. However, the efficiencies of the detectors used in practice might show a mismatch depending on the manufacturing and setup of these detectors. A mismatch can also be induced as the different spatial-temporal modes of an incoming signal might couple differently to a detector. Here we develop a method that allows to provide security proofs without the usual assumption. Our method can take the detection-efficiency mismatch into account without having to restrict the attack strategy of the adversary. Especially, we do not rely on any photon-number cut-off of incoming signals such that our security proof is directly applicable to practical situations. We illustrate our method for a receiver that is designed for polarization encoding and is sensitive to a number of spatial-temporal modes. In our detector model, the absence of quantum interference between any pair of spatial-temporal modes is assumed. For a QKD protocol with this detector model, we can perform a security proof with characterized efficiency mismatch and without photon-number cut-off assumption. Our method also shows that in the absence of efficiency mismatch in our detector model, the key rate increases if the loss due to detection inefficiency is assumed to be outside of the adversary's control, as compared to the view where for a security proof this loss is attributed to the action of the adversary.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源