Affiliation:
1. Beijing University of Posts and Telecommunications
2. China Telecom Research Institute
3. China Information Technology Security Evaluation Center
Abstract
The discrepancy between theory and experiment severely limits the development of quantum key distribution (QKD). Reference-frame-independent (RFI) protocols have been proposed to avoid alignment of the reference frame with the assumption of qubit systems. However, Trojan horse attacks and high-dimensional information leakage caused by equipment loopholes inevitably result in an imperfect non-qubit emitted signal. In this paper, we analyze the security of the RFI-QKD protocol with non-qubit source flaws based on a generalizing loss-tolerant method. The simulation results show that it is feasible to employ non-qubit flaw sources without compromising the security of the QKD system. Moreover, it only requires the preparation of four quantum states, which reduces the complexity of the experiment.
Funder
Fundamental Research Funds for the Central Universities
State Key Laboratory of Information Photonics and Optical Communications
Beijing University of Posts and Telecommunications
National Natural Science Foundation of China
Subject
Atomic and Molecular Physics, and Optics,Statistical and Nonlinear Physics