Experimental implementation of unit-independent type quantum key distribution with erroneous and correlated sources

Science China Press

Recently, the research group of Prof. Zeng-Bing Chen and Associate Prof. Hua-Lei Yin (National Laboratory of Solid State Microstructures and School of Physics, Collaborative Innovation Center of Advanced Microstructures, Nanjing University), cooperating with Beijing National Laboratory for Condensed Matter Physics and Institute of Physics, Chinese Academy of Sciences and other institutes, proposed a four-phase measurement- device-independent type quantum key distribution (QKD) protocol and implemented a proof-of-principle experiment to prove the feasibility. The study guaranteed security of the protocol against arbitrary source imperfections and all attacks at detector. Besides, the study characterized the source imperfections with measurable parameters in experimental implementations. The experimental result showed that the secure key rate could achieve 0.25 kbps when the channel loss is 20 dB. Under the channel loss of 10 dB (about 50 km optical fiber), the security key rate could achieve 91 kbps, which can meet the one-time pad encryption requirements for voice calls. Compared with previous measurement- device-independent QKD protocols that take account of imperfect sources, this research has significantly improved the security key rate and transmission distance, demonstrating the huge application potential in the practical deployment of secure QKD with device imperfections. The research result was published in Science Bulletin with the title of “Experimental measurement-device-independent type quantum key distribution with flawed and correlated sources”. [Science Bulletin 67, 2167 (2022)].

Compared with classical key distribution, QKD enables two distant participants, Alice and Bob, to share secure key bits for the encryption and decryption of secret communication. Together with the one-time pad algorithm, QKD offers theoretical security for information exchanges based on the laws of quantum mechanics. However, for the practical operation of QKD systems, a serious security loophole still exists, which occurs due to the discrepancy between theoretical security assumptions and practical devices. To be precise, a security proof of QKD is established with assumptions on the system devices, which cannot be satisfied for realistic devices because of inherent imperfections and the disturbance of eavesdroppers. This deviation results in more information leakage to eavesdroppers, which cannot be noticed by users. To narrow the discrepancy and further strengthen the security against device flaws, device independent QKD and measurement-device-independent QKD were proposed. Device independent QKD guarantees the unconditional security of QKD by measuring the violation of Bell’s inequality without any assumptions on devices. Recently, international researchers have firstly realized the proof-of-principle experiments of device independent QKD with studies published in Nature and Physical Review Letters, respectively. However, experimental implementations of device-independent QKD still suffer from short transmission distances and are far from being implemented in long-distance transmission. Measurement-device- independent QKD protocols can successfully close all the loopholes at detectors by introducing an untrusted intermediate node for interference measurement. Compared with device independent QKD protocols, measurement-device-independent QKD protocols do not need to make any assumptions on the intermediate node with a higher secure key rate and longer transmission distance. For example, the current world records of measurement-device-independent QKD protocols are the 404 km two-photon interference measurement-device-independent QKD [Phys. Rev. Lett. 117, 190501 (2016)] achieved by Hua-Lei Yin et al., and the 833 km single photon interference twin-field QKD [Nature Photo. 16, 154 (2022)] achieved by Shuang Wang et al. Measurement-device- independent QKD protocols are considered to be the best choice with practical security and efficiency. Therefore, it is significant to solve source imperfections in measurement-device-independent QKD protocols.

There mainly exists four kinds of source imperfections in QKD protocols including state preparation flaws, side channels caused by mode dependency, Trojan horse attacks and pulse correlations. For solving loopholes caused by the above source imperfections, the study adopted the recently proposed reference technique method [Sci. Adv. 6, eaaz4487 (2020)] to fully characterize the referred source imperfections and prove the security of a four-phase measurement-device-independent QKD protocol. Additionally, the study measured the parameters characterizing source imperfections and conducted a finite-key analysis of the protocol to help generate a secure key rate in the experiment.

Furthermore, the study implemented a proof-of-principle experiment to prove the feasibility of the protocol. The experiment utilized the Sagnac loop to stabilize the phase fluctuation of the channel automatically, and all optical fibers maintain polarization.

The simulation results can be seen in the second figure named “Simulation key rate vs. the overall transmission loss”. As shown in (a) and (b), with or without side channels, the proposed protocol can still have better performance where the secure key rate is one order of magnitude higher than previous protocols in the figures. As depicted in (c), considering source imperfections, the protocol can generate the secure key rate of 91 kbps with a 10 dB channel loss (approximately 50 km optical fiber), which can satisfy the requirements of voice calls. With the channel loss of 20 dB, the secure key rate can achieve 253 bps. When sources are perfect, the proposed protocol can be demonstrated over 35 dB, which is a considerable improvement in the transmission distance in the realm of practical secure QKD. Overall, the study is the first experimental implementation of a QKD protocol using the reference technique method to characterize source imperfections, which further proves the feasibility of the method. Considering source imperfections and all attacks at detection, the four-phase measurement-device-independent QKD protocol still can be used in practical application within intercity, which reveals its potential to be applied to the future deployment of practical secure QKD. The future study should solve the disadvantages of Sagnac loop with long-distance frequency-locked and phase-locked technology and the parameters should be characterized more precisely.

The corresponding authors are Associate Prof. Hua-Lei Yin and Prof. Zeng-Bing Chen in Nanjing University. This work was supported by the Natural Science Foundation of Jiangsu Province (BK20211145), the Fundamental Research Funds for the Central Universities (020414380182), the Key Research and Development Program of Nanjing Jiangbei New Area (ZDYD20210101), the Program for Innovative Talents and Entrepreneurs in Jiangsu (JSSCRC2021484).

See the article:

Experimental measurement-device-independent type quantum key

distribution with flawed and correlated sources

https://doi.org/10.1016/j.scib.2022.10.010

/Public Release. This material from the originating organization/author(s) may be of a point-in-time nature, edited for clarity, style and length. The views and opinions expressed are those of the author(s).View in full here.