Title
Finite-key security analysis of the 1-decoy state QKD protocol with a leaky intensity modulator.
Abstract
The finite-key security of the standard three-intensity decoy-state quantum key distribution (QKD) protocol in the presence of information leakage has been analyzed (Wang et al. in New J Phys 20:083027, 2018). On the other hand, the 1-decoy state QKD protocol has been proved to be able to achieve higher secret key rate than the three-intensity decoy-state QKD protocol in the finite-key regime by using only two different intensity settings (Davide et al. in Appl Phys Lett 112:171104, 2018). In this work, we analyze the finite-key security of the 1-decoy state QKD protocol with a leaky intensity modulator, which is used to generate the decoy state. In particular, we simulate the secret key rate under three practical cases of Trojan-horse attacks. Our simulation results demonstrate that the 1-decoy state QKD protocol can be secure over long distances within a reasonable time frame given that the intensity modulator is sufficiently isolated. By comparing the simulation results to those presented in Wang et al. (2018), we find that, as expected, the 1-decoy state QKD protocol is more robust against information leakage from the intensity modulator for all achievable distances.
Year
DOI
Venue
2020
10.1007/s11128-020-02694-6
Quantum Information Processing
Keywords
DocType
Volume
Quantum key distribution, One-decoy protocol, Information leakage, Intensity modulator, Finite-key security analysis
Journal
19
Issue
ISSN
Citations 
7
1570-0755
0
PageRank 
References 
Authors
0.34
0
4
Name
Order
Citations
PageRank
Weilong Wang100.34
Xiangdong Meng200.34
Yangyang Fei300.34
Zhi Ma441.47