11:15 AM - 11:30 AM
▲ [19a-A302-9] Encrypting-device QKD working as a measurement device independent system
Keywords:measurement device indepandent, encrypting-device QKD, quantum key distribution
Measurement-device-independent quantum key distribution (MDI-QKD) was proposed to be free
from side-channel attacks utilizing imperfections in measurement devices. In conventional MDI-QKD, Charlie, who is assumed to be an untrusted party, performs Bell-state measurement (BSM) on Alice’s and Bob’s signals. The main challenge in the practical implementation of such MDI-QKD schemes is to establish synchronization between the received signals in term of the timing, the polarization state, the temporal and spectral shapes for the BSM. In order to avoid such practical difficulties, this work introduces a modified BB84 protocol named encrypting-device quantum key distribution (ED-QKD). It employs an additional operation at Bob, by which Bob`s detection event does not contain key information itself, making detector`s behavior independent of the security of a created key. Our setup is simpler than conventional MDI-QKD schemes, yet it can overcome side-channel attacks utilizing detectors imperfections.
from side-channel attacks utilizing imperfections in measurement devices. In conventional MDI-QKD, Charlie, who is assumed to be an untrusted party, performs Bell-state measurement (BSM) on Alice’s and Bob’s signals. The main challenge in the practical implementation of such MDI-QKD schemes is to establish synchronization between the received signals in term of the timing, the polarization state, the temporal and spectral shapes for the BSM. In order to avoid such practical difficulties, this work introduces a modified BB84 protocol named encrypting-device quantum key distribution (ED-QKD). It employs an additional operation at Bob, by which Bob`s detection event does not contain key information itself, making detector`s behavior independent of the security of a created key. Our setup is simpler than conventional MDI-QKD schemes, yet it can overcome side-channel attacks utilizing detectors imperfections.