Skip to main content
Log in

Reference-free-independent quantum key distribution immune to detector side channel attacks

  • Published:
Quantum Information Processing Aims and scope Submit manuscript

Abstract

Usually, a shared reference frame is indispensable for practical quantum key distribution (QKD) systems. As a result, most QKD systems need active alignment of reference frame due to the unknown and slowly variances of reference frame introduced by environment. Quite interestingly, reference-free-independent (RFI) QKD can generate secret-key bits without alignment of reference frame. However, RFI QKD may be still vulnerable to detector side channel attacks. Here, we propose a new RFI QKD protocol, in which all detector side channels are removed. Furthermore, our protocol can still tolerate unknown and slow variance of reference frame without active alignment. And a numerical simulation shows that long security distance is probable in this protocol.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

References

  1. Bennett, C.H., Brassard, G.: Proceedings of IEEE International Conference on Computers, Systems, and Signal Processing, Bangalore, India, pp. 175–179. IEEE, New York (1984)

  2. Ekert, A.K.: Quantum cryptography based on Bell’s theorem. Phys. Rev. Lett. 67, 661 (1991)

    Article  MathSciNet  ADS  MATH  Google Scholar 

  3. Gisin, N., Ribordy, G., Tittel, W., Zbinden, H.: Quantum cryptography. Rev. Mod. Phys. 74, 145 (2002)

    Article  ADS  Google Scholar 

  4. Zhao, Y., Qi, B., Ma, X., Lo, H.-K., Qian, L.: Experimental quantum key distribution with decoy states. Phys. Rev. Lett. 96, 070502 (2006)

    Article  ADS  Google Scholar 

  5. Peng, C.-Z., Zhang, J., Yang, D., Gao, W.-B., Ma, H.-X., Yin, H., Zeng, H.-P., Yang, T., Wang, X.-B., Pan, J.-W.: Experimental long-distance decoy-state quantum key distribution based on polarization encoding. Phys. Rev. Lett. 98, 010505 (2007)

    Article  ADS  Google Scholar 

  6. Rosenberg, D., Harrington, J.W., Rice, P.R., Hiskett, P.A., Peterson, C.G., Hughes, R.J., Lita, A.E., Nam, S.W., Nordholt, J.E.: Long-distance decoy-state quantum key distribution in optical fiber. Phys. Rev. Lett. 98, 010503 (2007)

    Article  ADS  Google Scholar 

  7. Schmitt-Manderbach, T., et al.: Experimental demonstration of free-space decoy-state quantum key distribution over 144 km. Phys. Rev. Lett. 98, 010504 (2007)

    Article  ADS  Google Scholar 

  8. Zhao, Y., Qi, B., Ma, X.-F., Lo, H.-K., Qian, L.: Proceedings of IEEE International Symposium on Information Theory 2006, pp. 2094–2098

  9. Yuan, Z.-L., Sharpe, A.W., Shields, A.J.: Unconditionally secure one-way quantum key distribution using decoy pulses. Appl. Phys. Lett. 90, 011118 (2007)

    Article  ADS  Google Scholar 

  10. Yin, Z.-Q., et al.: Experimental decoy state quantum key distribution over 120 km fibre. China Phys. Lett. 25, 3547 (2008)

    Google Scholar 

  11. Laing, Anthony, Scarani, Valerio, Rarity, John G., O’Brien, Jeremy L.: Reference-frame-independent quantum key distribution. Phys. Rev. A 82, 012304 (2010)

    Article  ADS  Google Scholar 

  12. Shor, P.W., Preskill, J.: Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85, 441 (2000)

    Article  ADS  Google Scholar 

  13. Boileau, J.-C., et al.: Unconditional security of a three state quantum key distribution protocol. Phys. Rev. Lett. 94, 040503 (2005)

    Article  MathSciNet  ADS  Google Scholar 

  14. Wen, Kai, Tamaki, Kiyoshi, Yamamoto, Yoshihisa: Unconditional security of single-photon differential phase shift quantum key distribution. Phys. Rev. Lett. 103, 170503 (2009)

    Article  ADS  Google Scholar 

  15. Yin, Zhen-Qiang, Li, Hong-Wei, Chen, Wei, Han, Zheng-Fu, Guo, Guang-Can: Security of counterfactual quantum cryptography. Phys. Rev. A 82, 042335 (2010)

    Article  ADS  Google Scholar 

  16. Yin, Zhen-Qiang, Li, Hong-Wei, Yao, Yao, Zhang, Chun-Mei, Wang, Shuang, Chen, Wei, Guo, Guang-Can, Han, Zheng-Fu: Counterfactual quantum cryptography based on weak coherent states. Phys. Rev. A 86, 022313 (2012)

    Article  ADS  Google Scholar 

  17. Zhao, Yi, Fung, Chi-Hang Fred, Qi, Bing, Chen, Christine, Lo, Hoi-Kwong: Quantum hacking: experimental demonstration of time-shift attack against practical quantum-key-distribution systems. Phys. Rev. A 78, 042333 (2008)

    Article  ADS  Google Scholar 

  18. Lydersen, Lars, Wiechers, Carlos, Wittmann, Christoffer, Elser, Dominique, Skaar, Johannes, Makarov, Vadim: Hacking commercial quantum cryptography systems by tailored bright illumination. Nat. Photon. 4, 686–689 (2010)

    Article  ADS  Google Scholar 

  19. Li, Hong-Wei, Wang, Shuang, Huang, Jing-Zheng, Chen, Wei, Yin, Zhen-Qiang, Li, Fang-Yi, Zhou, Zheng, Liu, Dong, Zhang, Yang, Guo, Guang-Can, Bao, Wan-Su, Han, Zheng-Fu: Attacking a practical quantum-key-distribution system with wavelength-dependent beam-splitter and multiwavelength sources. Phys. Rev. A 84, 062308 (2011)

    Article  ADS  Google Scholar 

  20. Lo, Hoi-Kwong, Curty, Marcos, Qi, Bing: Measurement-device-independent quantum key distribution. Phys. Rev. Lett. 108, 130503 (2012)

    Article  ADS  Google Scholar 

Download references

Acknowledgments

This work was supported by the National Basic Research Program of China (Grants No. 2011CBA00200 and No. 2011CB921200), National Natural Science Foundation of China (Grants No. 61101137, No. 61201239 and No. 61205118).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhen-Qiang Yin.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Yin, ZQ., Wang, S., Chen, W. et al. Reference-free-independent quantum key distribution immune to detector side channel attacks. Quantum Inf Process 13, 1237–1244 (2014). https://doi.org/10.1007/s11128-013-0726-2

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11128-013-0726-2

Keywords

Navigation