论文标题
修改的BB84量子密钥分布协议可靠到源缺陷
Modified BB84 quantum key distribution protocol robust to source imperfections
论文作者
论文摘要
Bennett-Brassard 1984(BB84)协议是实施最广泛的量子密钥分布(QKD)方案。但是,尽管在过去几十年中,尽管理论和实验性巨大的努力,但该协议的安全性尚未得到严格确定。在这项工作中,我们解决了这一缺点,并在存在多种源缺陷的情况下证明了BB84协议的安全性,包括状态准备缺陷和侧向通道,例如Trojan-Horse攻击,模式依赖关系和发射脉冲之间的经典相关性。为此,我们考虑了一种修改后的BB84协议,该协议利用了基础不匹配的事件,这些事件通常在该方案的标准安全分析中丢弃;并采用参考技术,这是一种强大的数学工具,可在QKD的安全分析中适应源缺陷。此外,我们将修改后的BB84协议的可实现的秘密率与三态损失方案的方案的可实现的秘密速率进行了比较,并表明,在理想条件下添加第四个状态,虽然冗余在理想条件下冗余,可显着提高在源缺陷的存在下泄漏信息的估计,从而提高了效果。这项工作证明了BB84协议在保证实施安全性方面的相关性,使我们迈出了迈出QKD理论与实践之间现有差距的一步。
The Bennett-Brassard 1984 (BB84) protocol is the most widely implemented quantum key distribution (QKD) scheme. However, despite enormous theoretical and experimental efforts in the past decades, the security of this protocol with imperfect sources has not yet been rigorously established. In this work, we address this shortcoming and prove the security of the BB84 protocol in the presence of multiple source imperfections, including state preparation flaws and side channels, such as Trojan-horse attacks, mode dependencies and classical correlations between the emitted pulses. To do so, we consider a modified BB84 protocol that exploits the basis mismatched events, which are often discarded in standard security analyses of this scheme; and employ the reference technique, a powerful mathematical tool to accommodate source imperfections in the security analysis of QKD. Moreover, we compare the achievable secret-key rate of the modified BB84 protocol with that of the three-state loss-tolerant protocol, and show that the addition of a fourth state, while redundant in ideal conditions, significantly improves the estimation of the leaked information in the presence of source imperfections, resulting in a better performance. This work demonstrates the relevance of the BB84 protocol in guaranteeing implementation security, taking us a step further towards closing the existing gap between theory and practice of QKD.