Next Article in Journal
Early Days of SACLA XFEL
Next Article in Special Issue
Low-Rate Denial-of-Service Attack Detection: Defense Strategy Based on Spectral Estimation for CV-QKD
Previous Article in Journal
Analysis of Optical and Near-Infrared Luminescence of Er3+ and Er3+/Yb3+ Co-Doped Heavy Metal Borate Glasses for Optical Amplifier Applications
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Weak Randomness Analysis of Measurement-Device-Independent Quantum Key Distribution with Finite Resources

1
Henan Key Laboratory of Quantum Information and Cryptography, SSF IEU, Zhengzhou 450001, China
2
Synergetic Innovation Center of Quantum Information and Quantum Physics, University of Science and Technology of China, Hefei 230026, China
3
National Laboratory of Solid State Microstructures, School of Physics and Collaborative Innovation Center of Advanced Microstructures, Nanjing University, Nanjing 210093, China
*
Authors to whom correspondence should be addressed.
Photonics 2022, 9(5), 356; https://doi.org/10.3390/photonics9050356
Submission received: 27 April 2022 / Revised: 6 May 2022 / Accepted: 16 May 2022 / Published: 18 May 2022
(This article belongs to the Special Issue Recent Progress on Quantum Cryptography)

Abstract

:
The ideal quantum key distribution (QKD) protocol requires perfect random numbers for bit encoding and basis selecting. Perfect randomness is of great significance to the practical QKD system. However, due to the imperfection of practical quantum devices, an eavesdropper (Eve) may acquire some random numbers, thus affecting the security of practical systems. In this paper, we analyze the effects of the weak randomness in the measurement-device-independent QKD (MDI-QKD) with finite resources. We analytically derive concise formulas for estimating the lower bound of the single-photon yield and the upper bound of the phase error rate in the case of the weak randomness. The simulation demonstrates that the final secret key rate of MDI-QKD with finite resources is sensitive to state preparation, even with a small proportion of weak randomness, the secure key rate has a noticeable fluctuation. Therefore, the weak randomness of the state preparation may bring additional security risks. In order to ensure the practical security of the QKD system, we are supposed to strengthen the protection of state preparation devices.

1. Introduction

Theoretically, the quantum key distribution (QKD) can provide unconditional security for confidential communications of two legitimate parties, Alice and Bob [1]. Unfortunately, because of the imperfection of the practical system, many quantum attacks may take advantage of the loopholes introduced by imperfect devices [2,3,4], such as the wavelength attack [5], the detector control attack [6,7], the Trojan horse attack [8,9]. Actually, such kinds of attack methods have been experimentally demonstrated on QKD systems and cannot be ignored in terms of practical security.
In order to overcome the practical QKD system security threat, proposing new protocols and security patching have been two main solutions. Lo et al. proposed [10] the measurement-device-independent QKD (MDI-QKD) protocol, which is immune to all detector channel attacks without making any security assumptions about the quantum devices. Recently, twin-field QKD (TF-QKD) [11] and the asynchronous MDI-QKD [12] have been proposed, respectively. Their key rate can exceed the Pirandola–Laurenza–Ottaviani–Banchi (PLOB) bound [13]. Both MDI-QKD and TF-QKD have made significant progress in term of theory and experiment [14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32]. Although MDI-QKD and TF-QKD can resist all attacks on quantum state measurement devices, Eve may shift their target to quantum state preparation devices [33,34,35,36,37,38].
It has been hypothesized that Eve may control imperfect quantum state preparation devices so that bit encoding and measurement basis selection may be nonrandomly modulated in a practical QKD system [39]. Because of the quantum state preparation vulnerability of the weak randomness, a security evaluation of the weak randomness is of great significance in the practical QKD system. Based on this practical security threat, Li et al. proposed [40] a weak randomness model of the BB84 protocol. Under the model, the quantum states which Alice prepared are divided into two parts: the random part and the non-random part where the non-random part may be controlled by Eve to acquire more information. Zhang et al. [41] also analyzed reference-frame-independent QKD (RFI-QKD) security under the impact of the weak randomness, and briefly discussed the RFI-MDI-QKD under weak randomness.
In this paper, we will analyze the effects of weak randomness in vacuum + weak decoy-state MDI-QKD with finite resources [42,43,44,45,46] based on the universally composable framework. Here, we will present a tight security analysis in MDI-QKD with finite resources. In analyzing the weak randomness in MDI-QKD, we assume that the quantum states prepared by both Alice and Bob could be controlled by Eve with a certain probability [47], but Eve does not necessarily have the same abilities to control Alice or Bob. We also suppose that the quantum states prepared by both Alice and Bob are controlled by hidden variables λ and δ from Eve, where λ determines the quantum states prepared by Alice, δ determines the quantum states prepared by Bob. The non-random probability of quantum states prepared by Alice is p 1 , and the random probability is 1 p 1 . The non-random probability of quantum states prepared by Bob is p 2 , and the random probability is 1 p 2 . When p 1 = 1 or p 2 = 1 , it shows that Eve can obtain all the information, that is, R = 0 . When p 1 = p 2 = 0 , it indicates that Eve cannot directly acquire information, so the security can be assured. When 0 < p 1 < 1 , 0 < p 2 < 1 , the weak randomness model could be applied to estimate the amount of the leaked information obtained by Eve. From the experimental parameters, we deduce that the weak randomness of the state preparation has threatened the security of MDI-QKD, and MDI-QKD with finite resources has extremely strict requirements of state preparation. We should put forward higher requirements of state preparation randomness to ensure the practical security of the QKD system.
The rest of paper is organized as follows: we describe a practical vacuum + weak decoy-state MDI-QKD protocol with biased basis choice in Section 2. In Section 3, we present the weak randomness analysis for the protocol with finite resources and deduce concise formulas of bounding the yield and the bit error rate for the single-photon events. The numerical simulations are shown in Section 4 and the conclusion is summarized in Section 5.

2. Protocol Description

In a practical QKD system, we usually choose the weak coherent state source, which contains the vacuum state, the single photon state and the multiphoton state, instead of the single photon source. We focus on the vacuum + weak decoy-state MDI-QKD, and the description of the protocol is presented as follows [48]:
  • Preparation: Alice and Bob randomly modulate the intensities α a A = μ a , v a , 0 and β b B = μ b , v b , 0 with probability of p μ a , p v a , p 0 a = 1 p μ a p v a and p μ b , p v b , p 0 b = 1 p μ b p v b , respectively. Where μ a ( b ) is the signal state intensity, v a ( b ) is the decoy state intensity, 0 is the vacuum state. For signal states, Alice and Bob only choose the Z basis. For decoy states, Alice and Bob randomly choose a bit value from 0 , 1 , and select Z basis and X basis in probability of p z and 1 p z , respectively. Finally, they prepared a phase randomized, weak coherent pulse based on the selected value and send it to Charlie via a quantum channel.
  • Measurement and alignment: Charlie performs Bell state measurements (BSM) of pulses from Alice and Bob, and then publishes the measurements to Alcie and Bob. Both parties conduct basis alignment in open channel and compare their intensity: μ a ( v a ) , μ b ( v b ) . They retain correct measurement results and discard mismatched measurement results. At this time, the number of pulses successfully detected in the Z basis and X basis are n a b Z and n a b X , and the subscript indicates the intensity combinations chosen by Alice and Bob: μ a μ b , μ a v b , v a μ b , v a v b , μ a 0 , v a 0 , 0 μ b , 0 v b .
  • Parameter estimation: Firstly, Alice and Bob calculate the number of bit error in X basis m a b X . Second, they calculate the number of successful measurement results corresponding to the single photon pulse in Z basis s 11 Z and the number of phase error c 11 Z . Finally, they calculate the phase error rate in Z basis e p h = c 11 Z / s 11 Z e ˜ p h , where e ˜ p h refers to the phase bit error rate which needs to be met. Execution continues if complied, otherwise the agreement will be terminated.
  • Post-processing: Alice and Bob perform error correction, and the process consumes information at most as l e a k E C bits. They also use hash functions to perform error verification to ensure that both parties get the same key, and it requires consumption information of log 2 2 ε c o r bits, where ε c o r is the probability of passing the error verification process for the key pairs ( X A , X B ) . In the end, after the two parties perform the secret amplification operation, the key pairs are obtained by Alice is S A , and the key pairs obtained by Bob is S B .

3. Security Analysis

3.1. Security Bound

We first introduce the universally composable framework:
Definition 1
([42]). If the key pairs ( S A , S B ) generated by Alice and Bob satisfy the following conditions, the protocol is said to be ε-secure:
  • C o r r e c t n e s s . If the probability of keys S A , S B being not identical is maximal ε c o r , the keys are said to be ε c o r -correct:
    P r ( S A S B ) ε c o r ,
  • S c r e c y . The keys S A , S B are said to be ε s e c -secure with respect to the Eve holding a quantum system E if:
    1 2 p a b o r t ρ A E ρ U ρ E ε sec ,
    1 2 p a b o r t ρ B E ρ U ρ E ε sec .
    where p a b o r t denotes the probability of protocol failure aborted, ρ A E ( ρ B E ) denotes the classical-quantum states of the system for Alice (Bob) and system E, and ρ U denotes the fully mixed state on S A or S B .
The entropic uncertainty relation to establish a bound on the smooth min-entropy of the raw key conditioned on Eve’s information based on the composable security definition has been extended to the case with finite resources [43]. Here, we do the finite-key analysis based on the composable framework. The length of ε -secure keys in the Z basis is presented as follows [45]:
s 0 Z + s 11 Z , L 1 H e p h U l e a k E C 6 log 2 21 ε sec log 2 2 ε c o r .
with ε c o r -correct and ε s e c -secure, where s 0 Z refers to the number of measurement events when one party sends a vacuum state and Charlie obtains a successful BSM. s 11 Z and e p h U are the lower bound of the single photon count rate and the upper bound of the phase error rate in Z basis, respectively. H ( x ) = log 2 x ( 1 x ) log 2 ( 1 x ) is the binary entropy function, and l e a k E C is the number of bits consumed in the post-processing step.

3.2. Parameter Estimation

First of all, we consider the state preparation stage with weak randomness, supposing that Alice and Bob prepare binary set of bits S and T, respectively, to randomly encode the bit and select the basis. We apply | S | , | T | representing the number of elements of the set S and T, respectively. Due to the imperfection of the quantum devices, a part of the set S and T can be mastered by Eve. For the set of quantum states prepared by Alice, which is consisted of random part S 1 and non-random part S 2 . For the set of quantum states prepared by Bob, which is consisted of random part T 1 and non-random part T 2 . This assumption is reasonable by considering two cases: the first one is that the random number generator devices may be imperfect so that part of the random numbers may be leaked to Eve. The second one is that the imperfect state modulation may be prepared by different laser diodes from Alice and Bob, which can be partly distinguished by observing the properties of the spectrum, timing sequence. We define the probability of non-random parameter at Alice as p 1 = | S 2 | | S | , the probability of non-random parameter at Bob as p 2 = | T 2 | | T | . In a practical QKD system, we cannot guarantee the attack capabilities of Eve against Alice is the same as Bob, so we cannot ensure p 1 = p 2 . For the weak randomness condition, quantum states prepared by Alice and Bob in the practical system could be expressed as follows:
ρ A l i c e = p 1 2 α = 0 , 1 α α A l i c e α α E v e + ( 1 p 1 ) ρ A l i c e 2 2 E v e ,
ρ B o b = p 2 2 β = 0 , 1 β β B o b β β E v e + ( 1 p 2 ) ρ B o b 2 2 E v e .
where the quantum states prepared by Alice and Bob can be divided into two parts: the first term on the right-hand side of Equations (2) and (3) denote that the quantum states are prepared from a non-random set, the second term denote that the quantum states are prepared from a random set. The auxiliary quantum state of Eve is related to the system of Alice (Bob). For the system of Alice, if the auxiliary quantum state of Eve is α α E v e , it indicates that Eve can obtain the key of Alice α . For the system of Bob, if the auxiliary quantum state of Eve is β β E v e , it indicates that Eve can obtain the key of Bob β . For the system of Alice and Bob, if the auxiliary quantum state of Eve is 2 2 E v e , it indicates that Alice and Bob prepared the perfect BB84 quantum states ρ A l i c e and ρ B o b , and Eve cannot distinguish different encoding states at this point. Eve can distinguish random part S 1 and non-random part S 2 of Alice by observing auxiliary quantum states (and the random part T 1 and non-random part T 2 of Bob). The practical QKD system requires completely true random numbers for preparing quantum states. However, the weak randomness of practical QKD systems is universal because of the imperfection of quantum devices.
Note that the weak coherent state source encoding can be supposed to be a special non-random encoding case in the practical MDI-QKD system, where the quantum states from non-random part can be detected by exploiting the photon number splitting(PNS) attack. If the mean photon number of the weak coherent source is μ , the probability of non-random is the probability of multiphoton p 1 ( 2 ) . Actually, the PNS attack can be detected by applying the decoy-state method. However, because of the device variances, the weak randomness attack cannot be detected by utilizing the decoy-state method.
Under the weak randomness model, Eve wants to acquire more information so we can assume that Eve only performs a certain probability attenuation operation on the quantum states of the random part, and does not perform on the quantum states of the non-random part. Then we can suppose that the final bit error only come from the random part, and the non-random part does not produce the bit error. Based on the attenuation operation, the nonrandom probability in Charlie’s side can be amplified by considering the signal loss so that the maximal transmission distance may be decreased seriously. Moreover, because of the attenuation operation of the attacker, the single photon successful gain under Z basis is reduced, and the bit error rate under X basis is doubled, so the length of the final security key may be significantly reduced. The specific parameters are estimated as follows:
Firstly, let s n m Z be the total numbers of successful detection events Charlie obtains when Alice and Bob prepare n-photon states and m-photon states in Z basis, and n Z be the total numbers of events when quantum states are prepared by Alice and Bob in Z basis and are successfully detected by Charlie. For μ a μ b , μ a v b , v a μ b , v a v b , μ a 0 , v a 0 , 0 μ b , 0 v b , the expected value of n a b Z can be expressed as:
n ¯ a b Z = n , m = 0 p a b | n m Z s n m Z ,
where p a b | n m Z is the conditional probabilities that Alice and Bob prepared n-photon states and m-photon states in Z basis with intensity μ a μ b , μ a v b , v a μ b , v a v b , μ a 0 , v a 0 , 0 μ b , 0 v b . Based on Bayes’ rule, it can be expressed as:
p a b | n m Z = p a b Z τ a b Z p a | n p b | m .
where τ a b Z = p a b Z e a b a n b m n ! m ! is the probability of Alice and Bob prepared n-photon states and m-photon states in Z basis, and p a b Z is the probability of Alice and Bob modulate the intensity α a and β b in Z basis. p a | n and p b | m is the photon number distributions of Alice and Bob, respectively.
Subsequently, for the case of weak randomness model, the probability of quantum states prepared by Alice with non-randomness is p 1 , and the probability of quantum states prepared by Bob with non-randomness is p 2 . The probability of single-photon states prepared by both parties with randomness state is τ 11 ( 1 p 1 ) ( 1 p 2 ) , and the probability with non-randomness is τ 11 ( 1 ( 1 p 1 ) ( 1 p 2 ) ) = τ 11 ( p 1 + p 2 p 1 p 2 ) . The probability with randomness when only one party prepares a single photon state is τ 01 ( 1 p 1 ) ( 1 p 2 ) , the probability with non-randomness is τ 01 ( 1 ( 1 p 1 ) ( 1 p 2 ) ) = τ 01 ( p 1 + p 2 p 1 p 2 ) . In a practical quantum system, Eve may attenuate the quantum states prepared by Alice and Bob. Considering the weak randomness attenuation, signal loss may happen in random set S 1 ( T 1 ) , but all quantum states prepared in non-random set S 2 ( T 2 ) arrive to Charlie without signal loss. The probability of signal loss both two parties prepare and send single photon state in random set under Z basis is:
p l o s s Z = s 11 Z τ 11 Z ( p 1 + p 2 p 1 p 2 ) N N ( p 1 + p 2 p 1 p 2 ) N ,
the proportion of quantum states arriving at Charlie with non-randomness is:
p n o n r a n d Z = τ 11 Z ( p 1 + p 2 p 1 p 2 ) N s 11 Z ,
the proportion of quantum states arriving at Charlie with randomness is:
p r a n d Z = s 11 Z τ 11 Z ( p 1 + p 2 p 1 p 2 ) N s 11 Z ,
where N is the total number of transmitting signals.
Considering independent event conditions, we exploit C h e r n o f f bound [49] to perform finite-size key analysis on MDI-QKD. For the finite sample sizes, the number of practical measurement events can be satisfied [48]:
n ¯ a b Z n a b Z δ n a b Z , ε 1 ,
with probability at least 1 2 ε 1 , where δ x , y Δ , Δ ^ , with Δ = 2 x ln ( 16 y 4 ) and Δ ^ = 2 x ln ( y 3 / 2 ) .
Additionally, let s n m X be the total numbers of Charlie acquiring the successful detection events when Alice and Bob prepare n-photon states and m-photon states in X basis, and v n m X be the corresponding number of bit error. m a b X is the total amounts of bit error when Alice sends states in X basis and m a b X = n , m = 0 v n m X . For μ a μ b , μ a v b , v a μ b , v a v b , μ a 0 , v a 0 , 0 μ b , 0 v b , the expected numbers of bit error m a b X can be expressed as:
m ¯ a b X = n , m = 0 p a b | n m X v n m X ,
where p a b | n m X is the conditional probabilities that Alice and Bob prepare n-photon states and m-photon states in X basis with μ a μ b , μ a v b , v a μ b , v a v b , μ a 0 , v a 0 , 0 μ b , 0 v b . Based on Bayes’ rule, it can be expressed as:
p a b | n m X = p a b X τ a b X p a | n p b | m .
where τ a b X = p a b X e a b a n b m n ! m ! the probability of Alice prepare n-photon states and Bob and m-photon states in X basis. p a b X is the probability that Alice and Bob modulate the intensity μ a and β b in X basis, and p a | n and p b | m is the photon number distributions of Alice and Bob, respectively.
Similarly, within the independent event conditions, for the finite sample sizes, the m ¯ a b X under the c h e r n o f f bound can be satisfied [48]:
m ¯ a b X m a b X δ m a b X , ε 2 ,
with probability at least 1 2 ε 2 , where δ x , y Δ , Δ ^ , with Δ = 2 x ln ( 16 y 4 ) and Δ ^ = 2 x ln ( y 3 / 2 ) .
Actually, the probability of signal loss both two parties prepare and send single photon state in random set under X basis is:
p l o s s X = s 11 X τ 11 X ( p 1 + p 2 p 1 p 2 ) N N ( p 1 + p 2 p 1 p 2 ) N ,
the proportion of quantum states arriving at Charlie with non-randomness is:
p n o n r a n d X = τ 11 X ( p 1 + p 2 p 1 p 2 ) N s 11 X ,
the proportion of quantum states arriving at Charlie with randomness is:
p r a n d X = s 11 X τ 11 X ( p 1 + p 2 p 1 p 2 ) N s 11 X .
Note that, only the single-photon pulses from the random set can be used to generate secret keys. In analyzing the impacts of weak randomness, the number of single photon sent by both parties in Z basis which cannot generate secret keys is as follows:
s ˜ 11 Z = τ 11 Z ( 1 p 1 ) ( 1 p 2 ) N ,
the number of single photon sent by both parties which can generate secret keys satisfies:
s 11 s 11 Z , L s ˜ 11 Z , ,
the lower bound of the number of single photons sent by one party in Z basis which cannot generate secret keys is as follows:
s ˜ 0 Z = τ 01 Z ( 1 p 1 ) ( 1 p 2 ) N ,
the number of single photon sent by one party which can generate secret keys satisfies:
s 0 s 0 Z s ˜ 0 Z . ,
where the lower bound of the successful counts of the single photon sent by two parties in Z basis s 11 Z , L satisfies [50]:
s 11 Z , L [ p 1 | v a p 2 | μ a p 1 | v b p 2 | μ b p 2 | v a p 1 | μ a p 2 | v b p 1 | μ b N v a v b Z p 1 | v b p 2 | v b ( p 1 | v a p 2 | μ a p 2 | v a p 1 | μ a ) N v a μ b Z   p 1 | v a p 2 | v a ( p 1 | v b p 2 | μ b p 2 | v b p 1 | μ b ) N μ a v b Z ] × τ 11 Z p 1 | v a p 1 | v b ( p 1 | v a p 2 | μ a p 2 | v a p 1 | μ a ) ( p 1 | v b p 2 | μ b p 2 | v b p 1 | μ b ) ,
the number of successful counts of the single photon sent by one party in Z basis satisfies:
s 0 Z = e μ a n 0 μ b Z + e v a n 0 μ b Z + e μ a n 0 v b Z + e v a n 0 v b Z ,
where
N v a v b Z = n v a v b Z , L p v a p v b p Z p 0 | v a n 0 v b Z , U p 0 a p v b p Z p 0 | v b n v a 0 Z , U p v a p 0 b p Z + p 0 | v a p 0 | v b n 00 Z , L p 0 a p 0 b ,
N v a μ b Z = n v a μ b Z , U p v a p v b p Z p 0 | v a n 0 μ b Z , L p 0 a p μ b p Z p 0 | μ b n v a 0 Z , L p v a p 0 b p Z + p 0 | v a p 0 | μ b n 00 Z , U p 0 a p 0 b ,
N μ a v b Z = n μ a v b Z , U p μ a p v b p Z p 0 | μ a n 0 v b Z , L p 0 a p v b p Z p 0 | v b n μ a 0 Z , L p μ a p 0 b p Z + p 0 | μ a p 0 | μ b n 00 Z , U p 0 a p 0 b .
in the same way, we deduce the lower bound n a b Z , L and upper bound n a b Z , U of n a b Z by applying the C h e r n o f f bound.
Under the weak randomness condition, due to the attenuation operation of the attacker on the quantum channel, the probability of non-randomness in Charlie increases, so the bit error rate in X basis satisfies:
e b = e b X Y 11 X Y 11 X ( p 1 + p 2 p 1 p 2 ) ,
where Y 11 X is the number of single photons yield in the X basis, it satisfies [50]:
Y 11 X = [ p 1 | v a p 2 | μ a p 1 | v b p 2 | μ b p 2 | v a p 1 | μ a p 2 | v b p 1 | μ b N v a v b X p 1 | v b p 2 | v b ( p 1 | v a p 2 | μ a p 2 | v a p 1 | μ a ) N v a μ b X   p 1 | v a p 2 | v a ( p 1 | v b p 2 | μ b p 2 | v b p 1 | μ b ) N μ a v b X ] × 1 p 1 | v a p 1 | v b ( p 1 | v a p 2 | μ a p 2 | v a p 1 | μ a ) ( p 1 | v b p 2 | μ b p 2 | v b p 1 | μ b ) ,
in fact, the bit error rate in X basis without weak randomness is:
e b X = v 11 X , U s 11 X , L ,
the upper bound of the number of single photon bit error in X basis satisfies:
v 11 X , U τ 11 X M v a v b X p 1 | v a p 1 | v b ,
where
M v a v b X = m v a v b X , U p v a p v b p X p 0 | v a m 0 v b X , L p 0 a p v b p X p 0 | v b m v a 0 X , L p v a p 0 b p X + p 0 | v a p 0 | v b n 00 x , U p 0 a p 0 b .
here, m a b X , L and m a b X , U is the lower and upper bound of m a b X , respectively, and they can be obtained by the C h e r n o f f bound.
When Alice and Bob prepare single photon states in X basis, exploiting the same calculation methods we can acquire the total numbers of successful detection events Charlie obtains in X basis s 11 X comparable to the total number of successful detection events Charlie obtains in the Z basis s 11 Z .
In asymptotic conditions, we can assume that the phase bit error rate in Z basis is equal to the bit error rate in X basis, that is, e p h = e b X . However, under the condition of the finite length of the key, there is a deviation between e p h and e b . We suppose the deviation between the two is θ . Exploiting the random sampling method of Fung et al. [51], we can estimate the phase error rate of the single photon events:
Pr ( e p h e b + θ ) s 11 X , L + s 11 Z , L e b ( 1 e b ) s 11 X , L s 11 Z , L 2 ( s 11 X , L + s 11 Z , L ) σ ( θ ) ,
where
σ ( θ ) = H ( e b + θ s 11 X , L s 11 X , L + s 11 Z , L θ ) ( 1 s 11 X , L s 11 X , L + s 11 Z , L ) H ( e b + θ ) s 11 X , L s 11 X , L + s 11 Z , L H ( e b ) ,
for a given probability of failure ε sec :
ε sec = s 11 X , L + s 11 Z , L e b ( 1 e b ) s 11 X , L s 11 Z , L 2 ( s 11 X , L + s 11 Z , L ) σ ( θ ) ,
it can be calculated from θ = g ( ε sec , e b , s 11 X , L , s 11 Z , L ) , where
g ( a , b , c , d ) = ( c + d ) ( 1 b ) b c d ln 2 log 2 ( c + d c d ( 1 b ) b 21 2 a 2 ) ,
the upper bound of the phase error rate of the single-photon events in Z basis e p h can be expressed as:
e p h U e b + g ( ε sec , e b , s 11 X , L , s 11 Z , L ) ,
According to Equations (17), (19) and (34), we can calculate the length of final security key of the decoy-state MDI-QKD protocol with the weak randomness:
s 0 + s 11 1 H e p h U l e a k E C 6 log 2 21 ε sec log 2 2 ε c o r .

4. Numerical Simulations and Discussions

In this section, we numerically simulate the performance of effects of weak randomness on MDI-QKD with finite resources. We consider a fiber-based channel model and experimental parameters from [44], and define α = 0.2 (dm/km) as the fiber loss coefficient, η d = 0.145 as the detection efficiency of the relay Charlie, and p d = 6 × 10 7 as the dark count for detectors. L is the length of fiber between Charlie and Alice (Bob). The security bound is fixed to ε = 10 10 , and f = 1.16 is the efficiency of error correction. R   =   N N is the secret key rate, where N is the total number of transmitting signals sent by Alice. The numerical parameters are listed in Table 1.
Firstly, we analyze the effects of weak randomness existing only one party (Alice or Bob) in Figure 1, where we suppose Alice and Bob are symmetrical in the practical QKD system. Here, we assume p 2 = 0 which means that Eve just masters the randomness information of Alice. p 1 = 0 , 10 x ( x = 6 , 5 , 4 , 3 ) means that Eve has different abilities of mastering the randomness information of Alice. As shown in Figure 1, the dashed lines from right to left are obtained for different weak randomness parameters p 1 = 0 , 10 x ( x = 6 , 5 , 4 , 3 ) with the fixed finite number of total pulses N = 10 15 . We can deduce that although Eve just masters the randomness information of one party when N = 10 15 , the generation of the security key rate will be seriously affected, and the security key is no longer being generated when p 1 10 3 . Particularly, when the parameter of weak randomness p 1 rises from 0 to 10 3 , the achievable transmission distance declines from 182 km to 36 km.
Actually, compared with the general BB84 protocol, the MDI-QKD protocol is more vulnerable to the weak randomness of state preparation. The reason is that both of Alice and Bob perform the state preparation operation, which is different from BB84 protocol where just Alice performs the state preparation operation. In the practical MDI-QKD system, the possibility of the random number for bit encoding and basis selecting leaked to Eve may be greater because of the imperfection of the quantum devices.
Moreover, considering the practical MDI-QKD system with finite resources, we divide the weak randomness model into two cases. The first one is that the signal states and the decoy states may be modulated with the same laser diode by Alice and Bob so that both of the signal states and decoy states in Alice and Bob will be modulated with the same non-random probability p 1 and p 2 . The second one is that the signal states and the decoy states may be modulated with the different laser diode by Alice and Bob. The signal states and the decoy states which are prepared by Alice and Bob are supposed to be distinguished with the nonrandom probability p 1 and p 2 and the different signal states cannot be distinguished. If the signal states can be distinguished from the decoy states, Eve can exploit the PNS attack without detection. If the signal states cannot be distinguished from the decoy states, Eve can attenuate the states in the quantum channel.
In order to perform a better simulation, we then study the effects of weak randomness for different finite number of total pulses N. We define p 1 = p 2 = 10 6 as the secret key rate with weak randomness influence and p 1 = p 2 = 0 as the secure key rate without weak randomness influence. The effects of weak randomness for the secure key rate with different N = 10 x ( x = 13 , 14 , 15 , 16 ) are shown in Figure 2. Corresponding simulation results are shown in Figure 2, the solid lines from left to right are obtained for different total numbers of transmitting signals N = 10 x ( x = 13 , 14 , 15 , 16 ) with the fixed weak randomness parameters p 1 = p 2 = 0 and the dashed lines from left to right are obtained for different finite number of total pulses N = 10 x ( x = 13 , 14 , 15 , 16 ) with the fixed weak randomness parameters p 1 = p 2 = 10 6 . We can find that even though the weak randomness parameter is obtained as small as 10 6 , it will significantly affect the generation of the security key rate, which means that even small proportions of weak randomness can bring Eve a lot of information. As illustrated in Figure 2, because of Eve’s attenuation operation, the greater the total numbers of transmitting signals, the greater the reduction of the secure transmission distance. The achievable transmission distance declines 17.89 % , 15.38 % , 10.97 % , 5.88 % when N = 10 16 , 10 15 , 10 14 , 10 13 , respectively.
Apparently, with the number of total pulse increases, so does the number of quantum states which may be attenuated. Eve may obtain more information due to the relation between the expected values and the observed values for the case with different modulated states in the practical QKD system. In this case, the number of modulated states distinguished by Eve may increase which leads to more leakage of the security key information so we are supposed to control the number of total pulses within a rational range rather than arbitrarily choosing.
To further research the effects of the weak randomness for different N, we consider the secure key rate for N = 10 15 , 10 16 with different weak randomness parameters p 1 = p 2 = 0 , 10 x ( x = 6 , 5 , 4 , 3 ) in Figure 3. As illustrated in Figure 3, the solid lines from right to left are obtained for different weak randomness parameters p 1 = p 2 = 0 , 10 x ( x = 6 , 5 , 4 , 3 ) with the fixed finite number of total pulses N = 10 16 and the dashed lines from right to left are obtained for different weak randomness parameters p 1 = p 2 = 0 , 10 x ( x = 6 , 5 , 4 , 3 ) with the fixed finite number of total pulses N = 10 15 . We can discover that the security key rate of two different N lines are approximately asymptotic when the weak randomness parameters p 1 = p 2 10 5 , which means that the influence of the weak randomness on final security key rate is stronger than the finite number of total pulses. The security key rate of two different N lines are not asymptotic when the weak randomness parameters p 1 = p 2 10 6 , which means that the influence of the weak randomness on the final security key rate is weaker than the finite number of total pulses.
From the above simulation results, we can deduce that the weak randomness has a non-negligible effect on the secret key rate of the MDI-QKD with finite resources, even though the weak randomness parameter is small. Moreover, the effects of the weak randomness on final security key rate may perform differently for the different finite number of total pulses.

5. Conclusions

In conclusion, we analyze the effects of weak randomness on the security key rate of MDI-QKD with finite resources, and demonstrate that MDI-QKD has high security demand of quantum state preparation. The MDI-QKD system generates fewer security keys and the achievable transmission distance declines from 182 km to 36 km when just one party exists the weak randomness p 1 which rises from 0 to 10 3 . The system can no longer generate a security key when p 1 ( p 2 ) 10 3 . Considering the condition of finite resources, even though the weak randomness parameter is obtained as small as 10 6 or 10 5 , it will significantly affect the generation of the security key rate, which means that even small proportions of weak randomness can bring Eve a lot of information. Additionally, because of Eve’s attenuation operation, the greater the total numbers of transmitting signals, the greater the reduction of the secure transmission distance where the achievable transmission distance declines 17.89 % , 15.38 % , 10.97 % , 5.88 % for N = 10 16 , 10 15 , 10 14 , 10 13 . Moreover, the influence of the weak randomness on the final security key rate is stronger than the total numbers of transmitting signals when p 1 , p 2 10 5 , and the influence of the weak randomness on the final security key rate is weaker than total numbers of transmitting signals when p 1 , p 2 10 6 .
Finally, we conclude that the practical decoy-state MDI-QKD system requires strict randomness in the state preparation. In order to avoid the weak randomness loopholes, two aspects can be seriously considered in the practical MDI-QKD system: the first one is to protect the true random numbers from information leakage to Eve, and the another one is that the state modulation apparatus are supposed to be carefully designed so that different modulated quantum states in the side of both Alice and Bob cannot be distinguished in all degrees of freedom. For example, the narrow spectral filter and the time filter can be applied in the practical experiment to reduce the distinguishability.

Author Contributions

Conceptualization, X.-L.J.; methodology, X.-L.J. and Y.W.; software, X.-L.J. and Y.W.; validation, X.-L.J. and X.-Q.D.; formal analysis, X.-L.J., Y.W. and Y.-F.L.; investigation, X.-L.J. and X.-Q.D.; writing—original draft preparation, X.-L.J., X.-Q.D. and Y.W.; writing—review and editing, C.Z., J.-J.L. and W.-S.B.; supervision, W.-S.B.; project administration, W.-S.B.; funding acquisition, W.-S.B. and Y.W. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Natural Science Foundation of China (Grant No. 62101597), the National Key Research and Development Program of China (Grant No. 2020YFA0309702), the China Postdoctoral Science Foundation (Grant No. 2021M691536), the Natural Science Foundation of Henan (Grant No. 202300410534) and the Anhui Initiative in Quantum Information Technologies.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Bennett, C.; Brassard, G. Quantum Cryptography: Public Key Distribution and Coin Tossing. In Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing, Bangalore, India, 10–12 December 1984; pp. 175–179. [Google Scholar]
  2. Xu, F.; Ma, X.; Zhang, Q.; Lo, H.K.; Pan, J.W. Secure quantum key distribution with realistic devices. Rev. Mod. Phys. 2020, 92, 025002. [Google Scholar] [CrossRef]
  3. Pirandola, S.; Andersen, U.L.; Banchi, L.; Berta, M.; Bunandar, D.; Colbeck, R.; Englund, D.; Gehring, T.; Lupo, C.; Ottaviani, C.; et al. Advances in quantum cryptography. Adv. Opt. Photonics 2020, 12, 1012–1236. [Google Scholar] [CrossRef] [Green Version]
  4. Sun, S.; Huang, A. A Review of Security Evaluation of Practical Quantum Key Distribution System. Entropy 2022, 24, 260. [Google Scholar] [CrossRef] [PubMed]
  5. Li, H.W.; Wang, S.; Huang, J.Z.; Chen, W.; Yin, Z.Q.; Li, F.Y.; Zhou, Z.; Liu, D.; Zhang, Y.; Guo, G.C.; et al. Attacking a practical quantum-key-distribution system with wavelength-dependent beam-splitter and multiwavelength sources. Phys. Rev. A 2011, 84, 062308. [Google Scholar] [CrossRef] [Green Version]
  6. Lydersen, L.; Wiechers, C.; Wittmann, C.; Elser, D.; Skaar, J.; Makarov, V. Hacking commercial quantum cryptography systems by tailored bright illumination. Nat. Photonics 2010, 4, 686–689. [Google Scholar] [CrossRef] [Green Version]
  7. Qian, Y.J.; He, D.Y.; Wang, S.; Chen, W.; Yin, Z.Q.; Guo, G.C.; Han, Z.F. Robust countermeasure against detector control attack in a practical quantum key distribution system. Optica 2019, 6, 1178–1184. [Google Scholar] [CrossRef] [Green Version]
  8. Jain, N.; Anisimova, E.; Khan, I.; Makarov, V.; Marquardt, C.; Leuchs, G. Trojan-horse attacks threaten the security of practical quantum cryptography. New J. Phys. 2014, 16, 123030. [Google Scholar] [CrossRef] [Green Version]
  9. Lucamarini, M.; Choi, I.; Ward, M.B.; Dynes, J.F.; Yuan, Z.; Shields, A.J. Practical security bounds against the trojan-horse attack in quantum key distribution. Phys. Rev. X 2015, 5, 031030. [Google Scholar] [CrossRef] [Green Version]
  10. Lo, H.K.; Curty, M.; Qi, B. Measurement-device-independent quantum key distribution. Phys. Rev. Lett. 2012, 108, 130503. [Google Scholar] [CrossRef] [Green Version]
  11. Lucamarini, M.; Yuan, Z.L.; Dynes, J.F.; Shields, A.J. Overcoming the rate–distance limit of quantum key distribution without quantum repeaters. Nature 2018, 557, 400–403. [Google Scholar] [CrossRef]
  12. Xie, Y.M.; Lu, Y.S.; Weng, C.X.; Cao, X.Y.; Jia, Z.Y.; Bao, Y.; Wang, Y.; Fu, Y.; Yin, H.L.; Chen, Z.B. Breaking the Rate-Loss Bound of Quantum Key Distribution with Asynchronous Two-Photon Interference. PRX Quantum 2022, 3, 020315. [Google Scholar] [CrossRef]
  13. Pirandola, S.; Laurenza, R.; Ottaviani, C. Fundamental limits of repeaterless quantum communications. Nat. Commun. 2017, 8, 15043. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  14. Yin, H.L.; Chen, T.Y.; Yu, Z.W.; Liu, H.; You, L.X.; Zhou, Y.H.; Chen, S.J.; Mao, Y.; Huang, M.Q.; Zhang, W.J.; et al. Measurement-device-independent quantum key distribution over a 404 km optical fiber. Phys. Rev. Lett. 2016, 117, 190501. [Google Scholar] [CrossRef] [PubMed]
  15. Wang, C.; Yin, Z.Q.; Wang, S.; Chen, W.; Guo, G.C.; Han, Z.F. Measurement-device-independent quantum key distribution robust against environmental disturbances. Optica 2017, 4, 1016–1023. [Google Scholar] [CrossRef]
  16. Ma, X.; Zeng, P.; Zhou, H. Phase-matching quantum key distribution. Phys. Rev. X 2018, 8, 031043. [Google Scholar] [CrossRef] [Green Version]
  17. Liu, H.; Wang, J.; Ma, H.; Sun, S. Polarization-multiplexing-based measurement-device-independent quantum key distribution without phase reference calibration. Optica 2018, 5, 902–909. [Google Scholar] [CrossRef] [Green Version]
  18. Liu, H.; Wang, W.; Wei, K.; Fang, X.T.; Li, L.; Liu, N.L.; Liang, H.; Zhang, S.J.; Zhang, W.; Li, H.; et al. Experimental demonstration of high-rate measurement-device-independent quantum key distribution over asymmetric channels. Phys. Rev. Lett. 2019, 122, 160501. [Google Scholar] [CrossRef] [Green Version]
  19. Wei, K.; Li, W.; Tan, H.; Li, Y.; Min, H.; Zhang, W.J.; Li, H.; You, L.; Wang, Z.; Jiang, X.; et al. High-speed measurement-device-independent quantum key distribution with integrated silicon photonics. Phys. Rev. X 2020, 10, 031030. [Google Scholar] [CrossRef]
  20. Woodward, R.I.; Lo, Y.; Pittaluga, M.; Minder, M.; Paraïso, T.; Lucamarini, M.; Yuan, Z.; Shields, A. Gigahertz measurement-device-independent quantum key distribution using directly modulated lasers. Npj Quantum Inf. 2021, 7, 58. [Google Scholar] [CrossRef]
  21. Zhang, X.; Wang, Y.; Jiang, M.; Lu, Y.; Li, H.; Zhou, C.; Bao, W. Phase-Matching Quantum Key Distribution with Discrete Phase Randomization. Entropy 2021, 23, 508. [Google Scholar] [CrossRef]
  22. Hu, X.L.; Jiang, C.; Yu, Z.W.; Wang, X.B. Practical Long-Distance Measurement-Device-Independent Quantum Key Distribution By Four-Intensity Protocol. Adv. Quantum Technol. 2021, 4, 2100069. [Google Scholar] [CrossRef]
  23. Wang, X.B.; Yu, Z.W.; Hu, X.L. Twin-field quantum key distribution with large misalignment error. Phys. Rev. A 2018, 98, 062323. [Google Scholar] [CrossRef] [Green Version]
  24. Cui, C.; Yin, Z.Q.; Wang, R.; Chen, W.; Wang, S.; Guo, G.C.; Han, Z.F. Twin-field quantum key distribution without phase postselection. Phys. Rev. Appl. 2019, 11, 034053. [Google Scholar] [CrossRef] [Green Version]
  25. Zhong, X.; Wang, W.; Qian, L.; Lo, H.K. Proof-of-principle experimental demonstration of twin-field quantum key distribution over optical channels with asymmetric losses. Npj Quantum Inf. 2021, 7, 8. [Google Scholar] [CrossRef]
  26. Fang, X.T.; Zeng, P.; Liu, H. Implementation of quantum key distribution surpassing the linear rate-transmittance bound. Nat. Photonics 2020, 14, 422–425. [Google Scholar] [CrossRef]
  27. Curty, M.; Azuma, K.; Lo, H.K. Simple security proof of twin-field type quantum key distribution protocol. Npj Quantum Inf. 2019, 5, 64. [Google Scholar] [CrossRef]
  28. Lu, Y.F.; Wang, Y.; Jiang, M.S.; Zhang, X.X.; Liu, F.; Li, H.W.; Zhou, C.; Tang, S.B.; Wang, J.Y.; Bao, W.S. Sending or Not-Sending Twin-Field Quantum Key Distribution with Flawed and Leaky Sources. Entropy 2021, 23, 1103. [Google Scholar] [CrossRef]
  29. Pittaluga, M.; Minder, M.; Lucamarini, M.; Sanzaro, M.; Woodward, R.I.; Li, M.J.; Yuan, Z.; Shields, A.J. 600-km repeater-like quantum communications with dual-band stabilization. Nat. Photonics 2021, 15, 530–535. [Google Scholar] [CrossRef]
  30. Liu, H.; Jiang, C.; Zhu, H.T.; Zou, M.; Yu, Z.W.; Hu, X.L.; Xu, H.; Ma, S.; Han, Z.; Chen, J.P.; et al. Field test of twin-field quantum key distribution through sending-or-not-sending over 428 km. Phys. Rev. Lett. 2021, 126, 250502. [Google Scholar] [CrossRef]
  31. Chen, J.P.; Zhang, C.; Liu, Y.; Jiang, C.; Zhang, W.J.; Han, Z.Y.; Ma, S.Z.; Hu, X.L.; Li, Y.H.; Liu, H.; et al. Twin-field quantum key distribution over a 511 km optical fibre linking two distant metropolitan areas. Nat. Photonics 2021, 15, 570–575. [Google Scholar] [CrossRef]
  32. Wang, S.; Yin, Z.Q.; He, D.Y.; Chen, W.; Wang, R.Q.; Ye, P.; Zhou, Y.; Fan-Yuan, G.J.; Wang, F.X.; Zhu, Y.G.; et al. Twin-field quantum key distribution over 830-km fibre. Nat. Photonics 2022, 16, 154–161. [Google Scholar] [CrossRef]
  33. Lu, F.Y.; Yin, Z.Q.; Wang, R.; Fan-Yuan, G.J.; Wang, S.; He, D.Y.; Chen, W.; Huang, W.; Xu, B.J.; Guo, G.C.; et al. Practical issues of twin-field quantum key distribution. New J. Phys. 2019, 21, 123030. [Google Scholar] [CrossRef] [Green Version]
  34. Yin, Z.Q.; Fung, C.H.F.; Ma, X.; Zhang, C.M.; Li, H.W.; Chen, W.; Wang, S.; Guo, G.C.; Han, Z.F. Measurement-device-independent quantum key distribution with uncharacterized qubit sources. Phys. Rev. A 2013, 88, 062322. [Google Scholar] [CrossRef] [Green Version]
  35. Pereira, M.; Kato, G.; Mizutani, A.; Curty, M.; Tamaki, K. Quantum key distribution with correlated sources. Sci. Adv. 2020, 6, eaaz4487. [Google Scholar] [CrossRef]
  36. Lu, Y.F.; Wang, Y.; Jiang, M.S.; Liu, F.; Zhang, X.X.; Bao, W.S. Finite-key analysis of sending-or-not-sending twin-field quantum key distribution with intensity fluctuations. Quantum Inf. Process. 2021, 20, 135. [Google Scholar] [CrossRef]
  37. Mizutani, A.; Kato, G.; Azuma, K.; Curty, M.; Ikuta, R.; Yamamoto, T.; Imoto, N.; Lo, H.K.; Tamaki, K. Quantum key distribution with setting-choice-independently correlated light sources. Npj Quantum Inf. 2019, 5, 8. [Google Scholar] [CrossRef] [Green Version]
  38. Zhang, X.X.; Wang, Y.; Jiang, M.S.; Zhou, C.; Lu, Y.F.; Bao, W.S. Finite-key analysis of asymmetric phase-matching quantum key distribution with unstable sources. J. Opt. Soc. Am. B 2021, 38, 724–731. [Google Scholar] [CrossRef]
  39. Li, H.W.; Yin, Z.Q.; Wang, S.; Qian, Y.J.; Chen, W.; Guo, G.C.; Han, Z.F. Randomness determines practical security of BB84 quantum key distribution. Sci. Rep. 2015, 5, 16200. [Google Scholar] [CrossRef]
  40. Li, H.W.; Xu, Z.M.; Cai, Q.Y. Small imperfect randomness restricts security of quantum key distribution. Phys. Rev. A 2018, 98, 062325. [Google Scholar] [CrossRef]
  41. Zhang, C.M.; Wang, W.B.; Li, H.W.; Wang, Q. Weak randomness impacts the security of reference-frame-independent quantum key distribution. Opt. Lett. 2019, 44, 1226–1229. [Google Scholar] [CrossRef]
  42. Müller-Quade, J.; Renner, R. Composability in quantum cryptography. New J. Phys. 2009, 11, 085006. [Google Scholar] [CrossRef] [Green Version]
  43. Tomamichel, M.; Lim, C.C.W.; Gisin, N.; Renner, R. Tight finite-key analysis for quantum cryptography. Nat. Commun. 2012, 3, 634. [Google Scholar] [CrossRef] [PubMed]
  44. Curty, M.; Xu, F.; Cui, W.; Lim, C.C.W.; Tamaki, K.; Lo, H.K. Finite-key analysis for measurement-device-independent quantum key distribution. Nat. Commun. 2014, 5, 3732. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  45. Lim, C.C.W.; Curty, M.; Walenta, N.; Xu, F.; Zbinden, H. Concise security bounds for practical decoy-state quantum key distribution. Phys. Rev. A 2014, 89, 022307. [Google Scholar] [CrossRef] [Green Version]
  46. Wang, Y.; Bao, W.S.; Zhou, C.; Jiang, M.S.; Li, H.W. Tight finite-key analysis of a practical decoy-state quantum key distribution with unstable sources. Phys. Rev. A 2016, 94, 032335. [Google Scholar] [CrossRef]
  47. Li, H.W.; Xu, Z.M.; Yin, Z.Q.; Cai, Q.Y. Security of practical quantum key distribution with weak-randomness basis selection. Phys. Rev. A 2020, 102, 022605. [Google Scholar] [CrossRef]
  48. Zhou, C.; Bao, W.S.; Zhang, H.L.; Li, H.W.; Wang, Y.; Li, Y.; Wang, X. Biased decoy-state measurement-device-independent quantum key distribution with finite resources. Phys. Rev. A 2015, 91, 022313. [Google Scholar] [CrossRef] [Green Version]
  49. Tang, Y.L.; Yin, H.L.; Chen, S.J.; Liu, Y.; Zhang, W.J.; Jiang, X.; Zhang, L.; Wang, J.; You, L.X.; Guan, J.Y.; et al. Measurement-device-independent quantum key distribution over 200 km. Phys. Rev. Lett. 2014, 113, 190501. [Google Scholar] [CrossRef] [Green Version]
  50. Wang, Y.; Bao, W.S.; Zhou, C.; Jiang, M.S.; Li, H.W. Finite-key analysis of practical decoy-state measurement-device-independent quantum key distribution with unstable sources. J. Opt. Soc. Am. B 2019, 36, B83–B91. [Google Scholar] [CrossRef]
  51. Fung, C.H.F.; Ma, X.; Chau, H. Practical issues in quantum-key-distribution postprocessing. Phys. Rev. A 2010, 81, 012318. [Google Scholar] [CrossRef] [Green Version]
Figure 1. (Color online) The secret key rates (per pulse) in logarithmic scale versus transmission distance between Alice and Bob when just one party exists the weak randomness parameters and p 1 = 0 , 10 x ( x = 6 , 5 , 4 , 3 ) (curves from right to left) and another one do not exist weak randomness p 2 = 0 for fixed N = 10 15 .
Figure 1. (Color online) The secret key rates (per pulse) in logarithmic scale versus transmission distance between Alice and Bob when just one party exists the weak randomness parameters and p 1 = 0 , 10 x ( x = 6 , 5 , 4 , 3 ) (curves from right to left) and another one do not exist weak randomness p 2 = 0 for fixed N = 10 15 .
Photonics 09 00356 g001
Figure 2. (Color online) The secret key rates (per pulse) in logarithmic scale versus transmission distance between Alice and Bob with weak randomness parameters p 1 = p 2 = 0 , 10 6 for different N = 10 x ( x = 13 , 14 , 15 , 16 ) (curves from left to right). The dashed lines are results of p 1 = p 2 = 10 6 for different N, and the solid lines are the results of p 1 = p 2 = 0 for different N.
Figure 2. (Color online) The secret key rates (per pulse) in logarithmic scale versus transmission distance between Alice and Bob with weak randomness parameters p 1 = p 2 = 0 , 10 6 for different N = 10 x ( x = 13 , 14 , 15 , 16 ) (curves from left to right). The dashed lines are results of p 1 = p 2 = 10 6 for different N, and the solid lines are the results of p 1 = p 2 = 0 for different N.
Photonics 09 00356 g002
Figure 3. (Color online) The secret key rates (per pulse) in logarithmic scale versus transmission distance between Alice and Bob with p 1 = p 2 = 0 , 10 x ( x = 6 , 5 , 4 , 3 ) (curves from right to left) for different N = 10 15 , 10 16 . The dashed lines are results of N = 10 16 with different weak randomness parameters, and the solid lines are the results of N = 10 15 with different weak randomness parameters.
Figure 3. (Color online) The secret key rates (per pulse) in logarithmic scale versus transmission distance between Alice and Bob with p 1 = p 2 = 0 , 10 x ( x = 6 , 5 , 4 , 3 ) (curves from right to left) for different N = 10 15 , 10 16 . The dashed lines are results of N = 10 16 with different weak randomness parameters, and the solid lines are the results of N = 10 15 with different weak randomness parameters.
Photonics 09 00356 g003
Table 1. List of experimental parameters applied in the numerical simulation in the following table: α (dm/km) is the loss coefficient of the fiber, f is the efficiency of error correction, η d is the efficiency for the Charlie-side detector, e d is the optical misalignment error rate, p d is the dark count for detectors, and ε is the predetermined security bound.
Table 1. List of experimental parameters applied in the numerical simulation in the following table: α (dm/km) is the loss coefficient of the fiber, f is the efficiency of error correction, η d is the efficiency for the Charlie-side detector, e d is the optical misalignment error rate, p d is the dark count for detectors, and ε is the predetermined security bound.
α f η d e d p d ε
0.2 1.16 0.145 0.015 6 × 10 7 10 10
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Jiang, X.-L.; Deng, X.-Q.; Wang, Y.; Lu, Y.-F.; Li, J.-J.; Zhou, C.; Bao, W.-S. Weak Randomness Analysis of Measurement-Device-Independent Quantum Key Distribution with Finite Resources. Photonics 2022, 9, 356. https://doi.org/10.3390/photonics9050356

AMA Style

Jiang X-L, Deng X-Q, Wang Y, Lu Y-F, Li J-J, Zhou C, Bao W-S. Weak Randomness Analysis of Measurement-Device-Independent Quantum Key Distribution with Finite Resources. Photonics. 2022; 9(5):356. https://doi.org/10.3390/photonics9050356

Chicago/Turabian Style

Jiang, Xiao-Lei, Xiao-Qin Deng, Yang Wang, Yi-Fei Lu, Jia-Ji Li, Chun Zhou, and Wan-Su Bao. 2022. "Weak Randomness Analysis of Measurement-Device-Independent Quantum Key Distribution with Finite Resources" Photonics 9, no. 5: 356. https://doi.org/10.3390/photonics9050356

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop