Abstract
Usually, a shared reference frame is indispensable for practical quantum key distribution (QKD) systems. As a result, most QKD systems need active alignment of reference frame due to the unknown and slowly variances of reference frame introduced by environment. Quite interestingly, reference-free-independent (RFI) QKD can generate secret-key bits without alignment of reference frame. However, RFI QKD may be still vulnerable to detector side channel attacks. Here, we propose a new RFI QKD protocol, in which all detector side channels are removed. Furthermore, our protocol can still tolerate unknown and slow variance of reference frame without active alignment. And a numerical simulation shows that long security distance is probable in this protocol.
Similar content being viewed by others
References
Bennett, C.H., Brassard, G.: Proceedings of IEEE International Conference on Computers, Systems, and Signal Processing, Bangalore, India, pp. 175–179. IEEE, New York (1984)
Ekert, A.K.: Quantum cryptography based on Bell’s theorem. Phys. Rev. Lett. 67, 661 (1991)
Gisin, N., Ribordy, G., Tittel, W., Zbinden, H.: Quantum cryptography. Rev. Mod. Phys. 74, 145 (2002)
Zhao, Y., Qi, B., Ma, X., Lo, H.-K., Qian, L.: Experimental quantum key distribution with decoy states. Phys. Rev. Lett. 96, 070502 (2006)
Peng, C.-Z., Zhang, J., Yang, D., Gao, W.-B., Ma, H.-X., Yin, H., Zeng, H.-P., Yang, T., Wang, X.-B., Pan, J.-W.: Experimental long-distance decoy-state quantum key distribution based on polarization encoding. Phys. Rev. Lett. 98, 010505 (2007)
Rosenberg, D., Harrington, J.W., Rice, P.R., Hiskett, P.A., Peterson, C.G., Hughes, R.J., Lita, A.E., Nam, S.W., Nordholt, J.E.: Long-distance decoy-state quantum key distribution in optical fiber. Phys. Rev. Lett. 98, 010503 (2007)
Schmitt-Manderbach, T., et al.: Experimental demonstration of free-space decoy-state quantum key distribution over 144 km. Phys. Rev. Lett. 98, 010504 (2007)
Zhao, Y., Qi, B., Ma, X.-F., Lo, H.-K., Qian, L.: Proceedings of IEEE International Symposium on Information Theory 2006, pp. 2094–2098
Yuan, Z.-L., Sharpe, A.W., Shields, A.J.: Unconditionally secure one-way quantum key distribution using decoy pulses. Appl. Phys. Lett. 90, 011118 (2007)
Yin, Z.-Q., et al.: Experimental decoy state quantum key distribution over 120 km fibre. China Phys. Lett. 25, 3547 (2008)
Laing, Anthony, Scarani, Valerio, Rarity, John G., O’Brien, Jeremy L.: Reference-frame-independent quantum key distribution. Phys. Rev. A 82, 012304 (2010)
Shor, P.W., Preskill, J.: Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85, 441 (2000)
Boileau, J.-C., et al.: Unconditional security of a three state quantum key distribution protocol. Phys. Rev. Lett. 94, 040503 (2005)
Wen, Kai, Tamaki, Kiyoshi, Yamamoto, Yoshihisa: Unconditional security of single-photon differential phase shift quantum key distribution. Phys. Rev. Lett. 103, 170503 (2009)
Yin, Zhen-Qiang, Li, Hong-Wei, Chen, Wei, Han, Zheng-Fu, Guo, Guang-Can: Security of counterfactual quantum cryptography. Phys. Rev. A 82, 042335 (2010)
Yin, Zhen-Qiang, Li, Hong-Wei, Yao, Yao, Zhang, Chun-Mei, Wang, Shuang, Chen, Wei, Guo, Guang-Can, Han, Zheng-Fu: Counterfactual quantum cryptography based on weak coherent states. Phys. Rev. A 86, 022313 (2012)
Zhao, Yi, Fung, Chi-Hang Fred, Qi, Bing, Chen, Christine, Lo, Hoi-Kwong: Quantum hacking: experimental demonstration of time-shift attack against practical quantum-key-distribution systems. Phys. Rev. A 78, 042333 (2008)
Lydersen, Lars, Wiechers, Carlos, Wittmann, Christoffer, Elser, Dominique, Skaar, Johannes, Makarov, Vadim: Hacking commercial quantum cryptography systems by tailored bright illumination. Nat. Photon. 4, 686–689 (2010)
Li, Hong-Wei, Wang, Shuang, Huang, Jing-Zheng, Chen, Wei, Yin, Zhen-Qiang, Li, Fang-Yi, Zhou, Zheng, Liu, Dong, Zhang, Yang, Guo, Guang-Can, Bao, Wan-Su, Han, Zheng-Fu: Attacking a practical quantum-key-distribution system with wavelength-dependent beam-splitter and multiwavelength sources. Phys. Rev. A 84, 062308 (2011)
Lo, Hoi-Kwong, Curty, Marcos, Qi, Bing: Measurement-device-independent quantum key distribution. Phys. Rev. Lett. 108, 130503 (2012)
Acknowledgments
This work was supported by the National Basic Research Program of China (Grants No. 2011CBA00200 and No. 2011CB921200), National Natural Science Foundation of China (Grants No. 61101137, No. 61201239 and No. 61205118).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Yin, ZQ., Wang, S., Chen, W. et al. Reference-free-independent quantum key distribution immune to detector side channel attacks. Quantum Inf Process 13, 1237–1244 (2014). https://doi.org/10.1007/s11128-013-0726-2
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11128-013-0726-2