Next Article in Journal
Discrete Quadratic-Phase Fourier Transform: Theory and Convolution Structures
Next Article in Special Issue
Multi-Party Quantum Secret Sharing Based on GHZ State
Previous Article in Journal
Solving the Incompressible Surface Stokes Equation by Standard Velocity-Correction Projection Methods
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Security Analysis of Sending or Not-Sending Twin-Field Quantum Key Distribution with Weak Randomness

1
Henan Key Laboratory of Quantum Information and Cryptography, SSF IEU, Zhengzhou 450001, China
2
Synergetic Innovation Center of Quantum Information and Quantum Physics, University of Science and Technology of China, Hefei 230026, China
3
National Laboratory of Solid State Microstructures, School of Physics and Collaborative Innovation Center of Advanced Microstructures, Nanjing University, Nanjing 210093, China
*
Authors to whom correspondence should be addressed.
Entropy 2022, 24(10), 1339; https://doi.org/10.3390/e24101339
Submission received: 28 August 2022 / Revised: 14 September 2022 / Accepted: 20 September 2022 / Published: 23 September 2022
(This article belongs to the Special Issue Practical Quantum Communication II)

Abstract

:
Sending-or-not sending twin-field quantum key distribution (SNS TF-QKD) has the advantage of tolerating large amounts of misalignment errors, and its key rate can exceed the linear bound of repeaterless quantum key distribution. However, the weak randomness in a practical QKD system may lower the secret key rate and limit its achievable communication distance, thus compromising its performance. In this paper, we analyze the effects of the weak randomness on the SNS TF-QKD. The numerical simulation shows that SNS TF-QKD can still have an excellent performance under the weak random condition: the secret key rate can exceed the PLOB boundary and achieve long transmission distances. Furthermore, our simulation results also show that SNS TF-QKD is more robust to the weak randomness loopholes than the BB84 protocol and the measurement-device-independent QKD (MDI-QKD). Our results emphasize that keeping the randomness of the states is significant to the protection of state preparation devices.

1. Introduction

Quantum key distribution (QKD) has been widely proved to have information-theoretical security, which is guaranteed by the laws of physics between two authorized users, Alice and Bob [1,2]. However, it is well known that the imperfections of practical devices will compensate the security of the generated key. In fact, some quantum attacks have been discovered and demonstrated by exploiting these imperfections of practical devices. An eavesdropper (Eve) could take advantage of any imperfections in practical system to collect secret information without being discovered, with methods such as wavelength attack [3], the detector control attack [4,5], and the Trojan horse attack [6,7]. Therefore, researchers have to propose corresponding countermeasures to deal with these security threats.
In order to remove side-channel attacks at detection, Lo et al. proposed [8] the measurement-device-independent QKD (MDI-QKD) protocol, while the key rate of the MDI-QKD cannot be better than the linear scale of the channel transmittance. Fortunately, the twin-field QKD (TF-QKD) [9] and the asynchronous MDI-QKD [10] were proposed and improved the key rate to the square root of the channel transmittance. The key rate of them performs R O η (where η is the channel transmittance) and it can exceed the Pirandola–Laurenza–Ottaviani–Banchi (PLOB) bound [11]. But the later announcement of the phase information in the original TF-QKD [9] may cause security loopholes [12], so many variants of TF-QKD have been proposed [12,13,14,15] to deal with these loopholes. Particularly, the sending-or-not-sending (SNS) TF-QKD [12], as an efficient protocol, can tolerate large misalignment errors even up to 35 % in the single-photon interference. In fact, the SNS TF-QKD protocol has made significant progress in theory [16,17,18,19,20,21,22,23,24,25]. In addition, several experiments on the SNS protocol have also been performed so far [26,27,28,29,30,31].
In a practical QKD system, Eve may shift their target to quantum state preparation devices so that the bit encoding and measurement basis selection are non-randomly modulated by Alice or Bob [32]. For the quantum state preparation vulnerability of the weak randomness, Li et al. proposed [33] a weak randomness model in the BB84 protocol. Under the model, the quantum states that Alice has prepared are divided into two parts: the random part and the non-random part, and the latter may lead to the leakage of information. Since then, the model has been further promoted and applied in other protocols [34,35,36].
In this paper, we generalize the weak randomness attack model to the SNS TF-QKD. In fact, the SNS TF-QKD possesses the property of measurement-device-independent and can be applied using the coherent source with the decoy-state method [37,38,39]. Moreover, the operation of sending or not sending states for Alice and Bob can be regarded as the bit encoding operation, and the operation of selecting time windows can be regarded as the basis selection operation [12]. We analyze the effect of weak randomness on the final security key in the asymptotic and the finite-key size cases. Firstly, we will analytically derive the secret key rate formula based on the weak randomness model in the asymptotic case, and we then calculate the lower bound of the counting rate of the single-photon states and the upper bound of the phase error rate in finite-key cases [16]. In the security analysis of SNS TF-QKD with the weak randomness, we assume that Eve can interfere the quantum state preparation operation, and Eve is responsible for all weak randomness mentioned above. We also assume that the hidden variables ξ and ζ from Eve may determine the quantum states prepared by Alice and Bob, where ξ determines Alice’s quantum states and ζ determines Bob’s quantum states. The probability of non-random quantum states prepared by Alice is p 1 and the probability of random quantum states is 1 p 1 . The probability of non-random quantum states prepared by Bob is p 2 and the probability of random quantum states is 1 p 2 . If p 1 = 1 or p 2 = 1 , apparently, Eve can acquire all the information, that is, R = 0 . If p 1 = p 2 = 0 , Eve may partly acquire information. If 0 < p 1 < 1 , 0 < p 2 < 1 , the weak randomness model could be applied to quantify the maximal amount of leaked information and explore the security of SNS TF-QKD with weak randomness. Using the experimental parameters, we demonstrate that the secret key rate of SNS TF-QKD still can exceed the PLOB bound and achieve long secure transmission distances under the weak random condition. We then compare the effect of weak randomness on the BB84 protocol and MDI-QKD protocol, and we deduce that SNS TF-QKD can tolerate more weak randomness vulnerability.
The rest of paper is organized as follows: we describe a four-intensity decoy-state SNS TF-QKD protocol in Section 2. In Section 3, we analyze the effects of the weak randomness on the SNS TF-QKD protocol in the asymptotic and of the finite-key size cases. The numerical simulations are shown in Section 4 and the conclusion is made in Section 5.

2. Protocol Description

In the practical QKD system, we usually choose the weak coherent state source instead of the single photon source. Here, we consider the four-intensity decoy-state SNS protocol [16], and the description of the protocol is presented as follows:
  • Preparation. At any times window i, Alice (Bob) independently determines whether it is a decoy window or a signal window with probabilities p x and p z . If it is a decoy window, Alice (Bob) sends out to Charlie a decoy pulse in a phase-randomized coherent state μ a e i δ A , μ b e i δ A or 0 ( μ a e i δ B , μ b e i δ B or 0 ) with probabilities of p μ a , p μ b , p 0 . We suppose μ a < μ b . If it is a signal window, Alice (Bob) decides to send out to Charlie a signal pulse in phase-randomized coherent states μ z e i δ A or a vacuum state 0 ( μ z e i δ B or 0 ) with probabilities of p z 0 and 1 p z 0 , where δ A ( B ) is random in 0 , 2 π . Here, we assume that consecutive photons are well-separated in the decoy and the signal time windows. Note that a coherent state of intensity μ and global phase δ is a linear superposition of photon-number states μ e i δ = k = 0 e μ / 2 ( μ e i δ ) k k ! k . Whenever Alice or Bob sends a coherent state of intensity μ , it can be equivalently regarded as a probabilistic mixture of different photon-number states 0 2 π μ e i δ μ e i δ d δ / 2 π = k = 0 e μ μ k k ! k k .
  • Measurement. Alice and Bob send the chosen states to Charlie. Charlie then performs interferometric measurements on the incoming quantum signals after taking phase compensation and announces the measurement results of which detector clicks to Alice and Bob. An effective event is defined as follows: (1) if only one detector clicks corresponding to a time window i when both Alice and Bob have determined the signal window, it is defined as an effective event. (2) If only one detector clicks corresponding to a time window i when both Alice and Bob have determined a decoy window and sent the coherent states with the same intensity, and in that time window, the pre-chosen values δ A and δ B satisfy post-selection criterion, which is:
    1 cos ( δ A δ B ψ A B ) λ ,
    where δ A and δ B are the random phases of coherent states prepared by Alice and Bob, respectively. ψ A B could take an arbitrary value and it is set properly to acquire a satisfactory key rate, which will be different from time to time due to phase drift. The value of λ is determined by the size of the phase slice Δ , which is chosen by Alice and Bob. In fact, Equation (1) is equivalent to:
    θ A θ B ψ A B Δ 2 , θ A θ B ψ A B π Δ 2 .
    where x represents the minor angle enclosed by two rays, which enclose the rotational angle.
  • Sifting. Alice and Bob announce decoy windows and signal windows of each other. If both Alice and Bob choose the decoy window, it is defined to be an X ˜ window. If both Alice and Bob choose the signal window, it is defined to be a Z window. In an X ˜ window, it is an X 1 window, which is a subset of X ˜ windows, when they choose the same intensity μ a ( b ) . Additionally, it is an X 0 window when Alice (Bob) determines a signal window, while Bob (Alice) determines a decoy window, or when both Alice and Bob determine the decoy window, but choose different intensities. According to the effective events criterion introduced above, Alice and Bob decide whether one-detector clicks event is an effective event. We define three kinds of sets: Z , X 1 and X 0 , which include all effective events in Z, X 1 and X 0 windows.
  • Parameter estimation. For the events in the set Z of the Z window, if Alice decides to send out a phased-randomized weak coherent state, she (he) denotes a bit 1 and if she (he) decides to send a vacuum state, she (he) denotes a bit 0. If Bob decides to send out a phased-randomized weak coherent state, she (he) denotes a bit 0 and if she (he) decides not to send a vacuum state, she (he) denotes a bit 0. We notice that it is the decision that determines the bit value rather than what they send. Then, Alice and Bob could obtain the n t bit strings, and they will get an error bit if an effective event happens when both Alice and Bob decide to send or not send. Finally, adopting the decoy-state method, Alice and Bob could estimate the number of the single-photon states n 1 and phase-flip error rate e 1 p h according to the events in Z windows. They could estimate the lower bound of n 1 and upper bound of e 1 p h according to the events in X 1 and X 0 windows.
  • Error correction. Alice and Bob perform an error correction scheme to correct bit strings obtained in the last step. To achieve this goal, it consumes at most l e a k E C bits of error correction data. Then, Alice and Bob exploit a random two-universal hash function to carry out an error verification operation, which Alice sends a hash of length log 2 ( 1 / ε c o r ) to make sure that the key bits of Alice are the same as Bob.
  • Private amplification. In order to reduce Eve’s information of final keys, Alice and Bob exploit the random two-universal hash function to extract two shorter strings of length l. Finally, Alice and Bob obtain the secret key strings S A and S B .

3. Security Analysis

In this section, we may analyze the effects of the weak randomness on the decoy-state SNS TF-QKD in the asymptotic and the finite-key size cases. We may derive concise formulas for estimating the lower bound of the single-photon yield and the upper bound of the phase-flip error rate.

3.1. Parameter Estimation in the Asymptotic Case

As discussed above, the effective events that Alice decides to send and Bob decides not to send, or Alice decides not to send and Bob decides to send, in Z windows could generate the secret key. As a matter of fact, the selection of signal windows and decoy windows can be considered as the basis selection. In the decoy windows or the signal windows, sending or not sending a phase-randomized coherent state can be considered as the bit encoding. This assumption is reasonable by considering two cases. The first one is that the random numbers may be leaked to Eve because of the imperfection of the random number generator devices. The other one is that the imperfect state modulation may be prepared by different laser diodes from Alice and Bob, and they can be partly distinguished through observing the properties of the spectrum and timing sequence. Therefore, the weak randomness attack model which is used in the BB84 protocol and the MDI-QKD protocol is still appropriate to the SNS TF-QKD protocol. Under the weak randomness model, we suppose that the quantum states prepared by Alice and Bob can be considered as the set S and T, and S and T represent the number of elements of the set S and T. For the set of quantum states prepared by Alice (Bob), S 1 ( T 1 ) is the random part and S 2 ( T 2 ) is the non-random part. At this time, the probability of a non-random parameter at Alice could be defined as p 1 = S 2 S , and the probability of non-random parameter at Bob could be defined as p 2 = T 2 T . Under the practical QKD system, although we can assume the quantum devices at Alice and Bob are identical, the attack capabilities of Eve against Alice and Bob cannot be guaranteed same. That is, p 1 = p 2 is not necessary. In the model, we can re-describe the quantum states prepared by Alice and Bob in the practical system:
ρ Alice = p 1 2 a = 0 , 1 a a A l i c e a a E v e + ( 1 p 1 ) ρ A l i c e 2 2 E v e ,
ρ Bob = p 2 2 b = 0 , 1 b b B o b b b E v e + ( 1 p 2 ) ρ B o b 2 2 E v e .
where the quantum states prepared by Alice and Bob can be divided into two parts: the first part is prepared by a non-random set, and the second part is prepared by a random set. In the case in which the quantum states are in the first part, the assistant quantum states of Eve are related to Alice’s (Bob’s) system. More precisely, if the auxiliary quantum state of Eve is a a E v e , Eve can obtain the secret key a of Alice; if the auxiliary quantum state of Eve is b b E v e , Eve can obtain the secret key b of Bob. In the case in which the quantum state is prepared in the second part, if the auxiliary quantum state of Eve is 2 2 E v e , it indicates that Alice and Bob prepared the phase-randomized coherent states, which is equivalent to a probabilistic mixture of different photon-number states ρ A l i c e = k = 0 e μ a μ a k k ! k k and ρ B o b = k = 0 e μ b μ b k k ! k k and Eve can not distinguish encoding states. Therefore, Eve can distinguish the random part and non-random part states of Alice and Bob by observing auxiliary quantum states. The practical QKD systems require perfect random numbers for preparing quantum states. Unfortunately, the weak randomness of state preparation in practical QKD systems is universal because of the imperfections of quantum devices.
Under the weak randomness model, Eve wants to get more information, so she (he) may perform the attenuation operation on the quantum states from a random part by a certain probability, but cannot perform that on the quantum states from a non-random part. The attacker’s attenuation operation increases the non-randomness of the quantum states reaching Charlie, which leads to the increasing of the amount of information controlled by Eve. Because of the attenuation operation, we can assume that the bit error rate only happens in the random part, while the non-random part does not produce bit errors. As long as Eve controls the attenuation to make the final error rate less than a reasonable value, Alice and Bob cannot detect the presence of Eve, so Eve implements a weak-random attack. In this case, the non-random probability on Charlie’s side can be amplified by considering the signal loss so that the maximal transmission distance may be seriously decreased and the single photon counting rate in Z windows s 1 Z , which is used to generate the secret key, decreases, and the bit error rate in X windows e 1 X increases. Then, we estimate the parameters within the effects of weak randomness on SNS TF-QKD in the asymptotic case.
Firstly, we may analyze the state preparation step under the weak randomness condition. In the case where both Alice and Bob choose a signal window, Alice then sends quantum states and Bob does not send quantum states, or Bob sends quantum states and Alice does not send quantum states, and the probability of the states prepared by Alice or Bob with randomness is 2 p z 0 ( 1 p z 0 ) μ z e μ z ( 1 p 1 ) ( 1 p 2 ) , and the probability with non-randomness is 2 p z 0 ( 1 p z 0 ) μ z e μ z ( 1 ( 1 p 1 ) ( 1 p 2 ) ) = 2 p z 0 ( 1 p z 0 ) μ z e μ z ( p 1 + p 2 p 1 p 2 ) . Here, the probability of quantum states with non-randomness prepared by Alice is p 1 , and the probability of quantum states with non-randomness prepared by Bob is p 2 . In the practical QKD system, Eve can control the attenuation of the quantum states in the channel, and only attenuates the quantum states of the random part to ensure that the non-random part of the quantum states reach Charlie without attenuation. At the Charlie’s side, the proportion of non-random quantum states from the non-random part increases, and the proportion of quantum states from the random part decreases. In order to acquire more information, Eve may make the non-random scale of Charlie as large as possible. To ensure that she (he) may not be detected by both communicators, Eve must control the probability of attenuation or the attack will fail. Here, we calculate the probability of signal loss of the coherent states from the random set:
p l o s s 1 = 2 p z 0 ( 1 p z 0 ) μ z e μ z s 1 Z ( p 1 + p 2 p 1 p 2 ) 1 ( p 1 + p 2 p 1 p 2 ) ,
From the Equation (5), we can conclude the proportion of quantum states reaching Charlie with non-randomness:
p n o n r a n d 1 = p 1 + p 2 p 1 p 2 s 1 Z ,
The proportion of quantum states reaching Charlie with randomness is:
p r a n d 1 = s 1 Z ( p 1 + p 2 p 1 p 2 ) s 1 Z .
Since the quantum states of the random part are attenuated, the effective counting rate s 1 Z in the Z window and the bit error rate e 1 X in the X window will change. In fact, the quantum states of the non-random set cannot generate the security key, and only the quantum states of the random set may generate the security key. The counting rate from the non-random set in Z windows that cannot generate the secret key is:
s ˜ 1 Z = 2 p z 0 ( 1 p z 0 ) μ z e μ z ( p 1 + p 2 p 1 p 2 ) ,
The counting rate from the random set in Z windows that can generate the secret key satisfies:
s 1 = s 1 Z s ˜ 1 Z .
Under the weak randomness condition, in order to obtain more information, Eve attenuates the random part of the quantum states to ensure that the final error code only comes from the quantum states of the random part. The bit error rate in X ˜ windows after the attenuation operation is calculated:
e 1 = e 1 X p r a n d 1 = e 1 X s 1 Z s 1 Z ( p 1 + p 2 p 1 p 2 ) ,
Alice and Bob use the announced data from X 1 windows to calculate the counting rate s 1 Z , which is also the value for Z windows. The number of bits generated in Z windows could be calculated from this value. Moreover, the error rate of bits in X 1 windows of intensity μ and E μ X , the counting rate of intensity μ and S μ , and the counting rate of vacuum s 0 can be observed, so we can calculate the upper bound value of the flipping rate [12]:
e 1 X e 1 X , U = S μ E μ X e 2 μ s 0 / 2 2 μ e 2 μ s 1 Z .
In the asymptotical condition, the phase-flip rate satisfies e 1 p h = e 1 X . Similarly, under the weak randomness model, the phase-flip rate satisfies e 1 p h = e 1 . Finally, we can distill the final key with an asymptotic key rate formula with weak randomness:
R = 2 p z 0 ( 1 p z 0 ) μ z e μ z s 1 1 H ( e 1 p h ) f S Z H ( E Z ) .
where H ( x ) = x log 2 ( x ) ( 1 x ) log 2 ( 1 x ) is the binary entropy function, S Z is the observed counting rate of Z windows, E Z is the corresponding bit-flip error rate and f is the efficiency of error correction.

3.2. Parameter Estimation with the Finite-Key Size

In a practical QKD system, the number of photons sent is finite and the intensities cannot be infinite in Z windows or X ˜ windows. In this section, we consider the effects of the weak randomness on SNS TF-QKD with the finite-key size based on the universally composable framework [40]. To close the gap between the expected values and observed values, we exploit the Improved-Chernoff bound [41,42,43] to estimate the counting rate of single-photon states n 1 and the phase-flip error rate e 1 p h .
Firstly, we make an introduction of the universally composable framework [40]:
Definition 1.
If the final key strings S A and S B of Alice and Bob satisfy the following conditions, the protocol is defined to be ε-secure:
  • Correctness. A protocol is ε c o r -correct if S A and S B of Alice and Bob are not identical with the maximal probability of ε c o r :
    Pr ( S A S B ) ε c o r ,
  • Secrecy. The final key strings S ( S A or S B ) are said to be ε sec -secret with respect to the Eve holding a quantum system E if:
    1 2 p a b o r t ρ S ρ U ρ E ε sec ,
    where p a b o r t denotes the probability of protocol failure aborted, ρ S denotes the classical-quantum states of the system for Alice (Bob) and system E, and ρ U denotes the fully mixed states on S A or S B .
The security against general attacks based on the entropic uncertainty relation for the smooth min-extropy in the SNS TF-QKD has been proven. According to the finite-key analysis based on the universally composable framework, the length of secret keys can be presented as follows [16,44]:
= n 1 1 H ( e 1 p h ) l e a k E C log 2 2 ε c o r 2 log 2 1 2 ε P A ε ^ .
According to the composable framework, the security coefficient of the whole protocol is ε t o l = ε c o r + ε sec , where ε sec = 2 ε ^ + 4 ε ¯ + ε P A + ε n 1 . ε c o r is the failure probability of error correction; ε ¯ and ε P A are the failure probability for the estimation of the phase-flip error rate and privacy amplification; ε n 1 is the failure probability for estimation of the lower bound of the counting rate of single-photon states. l e a k E c = f n t h ( E z ) , where n t is final length of the secret key string, E z is the corresponding error rate.
In X ˜ windows, Alice and Bob do not announce any phase information. The coherent states sent out can be regarded as a classical mixture of different photon numbers. We denote ρ v , ρ a and ρ b . Let N α β be the number of the events which Alice sends ρ α and Bob sends ρ β , where α , β v , v , v , a , a , v , v , b , b , v . Here, we suppose that Alice and Bob repeat the P r e p a r a t i o n and M e a s u r e m e n t step N times, so N α β can be expressed as follows [16]:
N v v = ( 1 p μ a p μ a ) 2 ( 1 p z ) 2 + 2 ( 1 p μ a p μ b ) ( 1 p z ) p z p z 0 N ,
N v a = N a v = ( 1 p μ a p μ b ) ( 1 p z ) 2 p μ a + ( 1 p z ) p z p z 0 p μ a N ,
N v b = N b v = ( 1 p z ) 2 ( 1 p μ a p μ b ) p μ b + ( 1 p z ) p z p z 0 p μ b N .
let n α β be the number of effective events of one-detector heralded corresponding to the N α β . For α , β v , v , v , a , a , v , v , b , b , v , n α β can be expressed as:
n v v = 2 p d ( 1 p d ) N v v ,
n v a = n a v = 2 ( 1 p d ) e η μ a / 2 ( 1 p d ) 2 e η μ a N v a ,
n v b = n b v = 2 ( 1 p d ) e η μ b / 2 ( 1 p d ) 2 e η μ b N v b .
To close the gap between the expected values and observed values, we apply Improved-Chernoff bound [41,42,43] to obtain the upper and lower bound of the expected value of n α β considering independent event conditions:
n α β U = n α β 1 δ U , n α β L = n α β 1 + δ L .
where we can obtain the values of δ U and δ L by solving the following equations:
e δ U ( 1 δ U ) 1 δ U X / ( 1 δ U ) = ε 2 ,
e δ L ( 1 + δ L ) 1 + δ L X / ( 1 + δ L ) = ε 2 .
where ε is the failure probability, x is the expected value of x. From Equations (20)–(22), we can obtain the upper and lower bound of n α β , n α β U and n α β L . Then, we denote the counting rate of state ρ α and state ρ β as S α β , which can be expressed as:
S α β = n α β N α β ,
Obviously, from Equations (20) and (23), we can easily obtain the upper and lower bound of the expected value of S α β :
S α β U = n α β U N α β , S α β L = n α β L N α β .
Similarly, in the case of the finite-key size, the probability of signal loss of the coherent states from the random set can be calculated as:
p l o s s 2 = n 1 2 p z 0 ( 1 p z 0 ) μ z e μ z ( p 1 + p 2 p 1 p 2 ) N N ( p 1 + p 2 p 1 p 2 ) N ,
from the Equation (25), we can conclude the proportion of quantum states reaching Charlie with non-randomness:
p n o n r a n d 2 = 2 p z 0 ( 1 p z 0 ) μ z e μ z ( p 1 + p 2 p 1 p 2 ) N n 1 ,
the proportion of quantum states reaching Charlie with randomness is:
p r a n d 2 = n 1 2 p z 0 ( 1 p z 0 ) μ z e μ z ( p 1 + p 2 p 1 p 2 ) N n 1 .
Due to the quantum states in the random part being attenuated, the number of the effective counting rate n 1 and the phase-flip error rate e 1 p h in the Z window may change. The quantum states in the non-random set cannot generate the security key, and only the quantum states in the random set may generate the security key. The number of the effective events caused by single-photon states from the non-random set in Z windows that cannot generate the secret key is:
n ˜ 1 = 2 p z 0 ( 1 p z 0 ) μ z e μ z s ˜ 1 Z N ,
The number of the effective events caused by single-photon states from the random set that can generate the secret key is:
n 1 = n 1 n ˜ 1 = 2 p z 0 ( 1 p z 0 ) μ z e μ z ( s 1 Z s ˜ 1 Z ) N .
where the lower bound of the effective counting rate s 1 Z of the finite-key size satisfies [16,17]:
s 1 Z s 1 Z , L = 1 2 μ a μ b μ b μ a μ b 2 e μ a ( S v a L + S a v L ) μ a 2 e μ b ( S v b U + S b v U ) 2 ( μ b 2 μ a 2 ) S v v U .
Moreover, in order to estimate the upper bound of e 1 p h , we need to define two new subsets C Δ + and C Δ of X 1 windows when δ A δ B Δ 2 and δ A δ B π Δ 2 , where we have supposed that ψ A B = 0 . The number of instances in C Δ + and C Δ is:
N Δ + = N Δ = Δ 2 π ( 1 p z ) 2 p μ a 2 N ,
Here, we denote the number of effective events of right detector from C Δ + and the number of effective events of left detector from C Δ as n Δ + R and n Δ L :
n Δ + R = ( W a ( 1 e d ) + C a e d ) N Δ + ,
n Δ L = ( W a ( 1 e d ) + C a e d ) N Δ .
where W a and C a is the average probability of correct counting and wrong counting, respectively, which can be given as:
W a = 1 Δ Δ / 2 Δ / 2 ( 1 p d ) e 2 η μ a sin 2 θ 2 d θ ( 1 p d ) 2 e 2 η μ a ,
C a = 1 Δ Δ / 2 Δ / 2 ( 1 p d ) e 2 η μ a cos 2 θ 2 d θ ( 1 p d ) 2 e 2 η μ a .
Considering independent event conditions, we apply the Improved-Chernoff bound [41,42,43] to obtain the upper and lower bound of the expected value of n Δ ± R . For the finite sample sizes, the number of effective events of the right and left detector from C Δ + and C Δ satisfies:
n Δ + R , U = n Δ + R 1 δ U , n Δ + R , L = n Δ + R 1 + δ L ,
n Δ L , U = n Δ L 1 δ U , n Δ L , L = n Δ L 1 + δ L .
With the failure probability ε , we can obtain the values of δ U and δ L by solving the following equations:
e δ U ( 1 δ U ) 1 δ U X / ( 1 δ U ) = ε 2 ,
e δ L ( 1 + δ L ) 1 + δ L X / ( 1 + δ L ) = ε 2 .
We have the upper bound of the expected value of counting error rate from C Δ + and C Δ :
T Δ U = 1 2 T Δ + U + T Δ U = 1 2 n Δ + R , U N Δ + + n Δ R , U N Δ ,
Eve may attenuate the random part of the quantum states to ensure that the final error code only comes from the quantum states in the random part. The value of the counting error rate after the attenuation operation is calculated:
T Δ = T Δ U p r a n d 2 = T Δ U s 1 Z s 1 Z ( p 1 + p 2 p 1 p 2 ) .
The upper bound of the expected value of the phase-flip error rate satisfies [16,17]:
e 1 p h e 1 p h , U = T Δ 1 2 e 2 μ a S v v L 2 μ a e 2 μ a s 1 Z , L ,
Furthermore, we are supposed to simulate the information leakage in the protocol. According to the events in Z windows, Alice and Bob can obtain a secret string of n s bits. They do not care about which detector clicks as long as only one detector clicks. The length of the secret key string is n t = n s i g n a l + n e r r o r . The number of right bits n s i g n a l and wrong bits n e r r o r can be given:
n s i g n a l = 4 N p z 2 p z 0 ( 1 p z 0 ) ( 1 p d ) e η μ z / 2 ,
n e r r o r = 2 N p z 2 ( 1 p z 0 ) 2 ( 1 p d ) e η μ z / 2 I 0 ( η μ z ) ( 1 p d ) 2 e η μ z + 2 N p z 2 p z 0 2 ( 1 p d ) .
where I 0 ( x ) is the zero-order hyperbolic Bassel function of the first kind. The error rate of the final key string is E z = n e r r o r n t .
Finally, combining the Equations (29), (42)–(44), we can calculate the length of final security key in the SNS TF-QKD protocol with the weak randomness:
= n 1 1 H ( e 1 p h ) l e a k E C log 2 2 ε c o r 2 log 2 1 2 ε P A ε ^ .

4. Numerical Simulations

Here, we simulate the performance of effects of weak randomness on SNS TF-QKD in the asymptotic case and with the finite-key size. We use the linear model to numerically simulate the performance of the protocol. Firstly, we set the experimental parameters that we may exploit. Then, we set the results of the final secret key rate and the analysis of results.
We define η = 10 α L / 10 as the fiber transmittance, where α = 0.2 (dB/km) is the fiber loss coefficient and L is the length of fiber between Charlie and Alice (Bob). η d = 80 % is the detection efficiency of the relay Charlie, and p d = 10 10 is the dark count of Charlie’s detectors. The failure probability of statistical fluctuations analysis is fixed to ε = 10 10 , and f = 1.1 is the efficiency of error correction. R = N N is the final secret key rate, where N is the total number of transmitting signals sent by Alice and Bob. The numerical parameters are listed in Table 1. Here, we set ε c o r = ε ^ = ε P A = ε , ε ¯ = 3 ε , and ε n 1 = 4 ε .
Firstly, we analyze the results of weak randomness existing in only one party (Alice or Bob) in the asymptotic and the finite-key size cases in Figure 1. Here, p 1 0 , p 2 = 0 means that Eve just masters the randomness information of Alice, and p 1 = 0 , 10 x ( x = 6 , 5 , 4 , 3 ) means that Eve has different abilities for controlling the randomness information. We then analyze the results of weak randomness existing in both parties in the asymptotic case and the finite-key size cases in Figure 2, where Eve masters the randomness information of both Alice and Bob. As illustrated in Figure 1 and Figure 2, the dashed lines from right to left are acquired for different weak randomness parameters p 1 = 0 , 10 6 , 10 5 , 10 4 , 10 3 with the infinite number of total pulses, and the solid lines from right to left are acquired for different weak randomness parameters p 1 = 0 , 10 x ( x = 6 , 5 , 4 , 3 ) with the fixed finite number of total pulses N = 10 15 . In the Figure 1, compared with the perfect randomness p 1 = p 2 = 0 , we can calculate that the achievable transmission distance declines 11.96 % , 26.91 % , 43.52 % , 60.46 % in asymptotic cases and declines 14.39 % , 30.93 % , 48.56 % , 66.19 % with the finite-key size when p 1 = 10 6 , 10 5 , 10 4 , 10 3 . In the Figure 2, compared with the perfect randomness p 1 = p 2 = 0 , the achievable transmission distance declines 14.39 % , 30.93 % , 48.56 % , 66.19 % in asymptotic cases and declines 15.95 % , 31.89 % , 48.50 % , 65.12 % with the finite-key size when p 1 = 0 , 10 6 , 10 5 , 10 4 , 10 3 . Nevertheless, we find that the secret key rate can exceed the PLOB bound [11] when p 1 ( p 2 ) 10 6 with the finite-key size N = 10 15 , and it can still exceed the PLOB bound [11] when p 1 ( p 2 ) 10 5 in the asymptotic case. From the above calculation data, we can deduce that the fluctuation of the finite-key size is greater than asymptotic cases for the fixed weak randomness parameters. Moreover, comparing with two simulation results, we can find that although the randomness information mastered by Eve of the Figure 2 is twice as much as the randomness information mastered by Eve of the Figure 1, it does not decrease exponentially, which means that once Eve obtains part of the information, it can seriously affect the practical system security.
In order to perform a detailed simulation, we then research the results of the weak randomness for the different total numbers of transmitting signals N = 10 x ( x = 12 , 13 , 15 ) . Corresponding simulation results are illustrated in Figure 3, the dashed lines from left to right are acquired for N = 10 x ( x = 12 , 13 , 15 ) with the fixed p 1 = p 2 = 10 6 and the solid lines from left to right are acquired for N = 10 x ( x = 12 , 13 , 15 ) with the fixed p 1 = p 2 = 0 . We can notice that the generation of the security key rate will be significantly affected, even though the weak randomness parameter is small as 10 6 , which means that Eve will obtain amounts of information even with small proportions of weak randomness. As shown in Figure 3, the achievable transmission distance declines 104 km when N = 10 15 , 60 km when N = 10 13 , and 10 km when N = 10 12 , so we deduce that the greater the number of total pulses, the more the secure transmission distance decreases. We find that the secret key rate cannot exceed the PLOB bound [11] when N 10 13 with the fixed p 1 = p 2 = 10 6 . The number of total pulse increases, so does the number of quantum states which may be attenuated. Eve may obtain more information due to the relation between the expected values and the observed values for the case with different modulated states in the practical QKD system. In this case, the number of modulated states distinguished by Eve may increase which leads to more leakage of the security key information so we are supposed to control the number of total pulses within a rational range rather than arbitrarily choosing.
To further study the impacts of the weak randomness for different total numbers of transmitting signals, we then research the secret key rate for N = 10 13 , 10 15 with p 1 = p 2 = 0 , 10 x ( x = 6 , 5 , 4 , 3 ) in Figure 4. As illustrated in Figure 4, the dashed lines from right to left are acquired for different weak randomness parameters p 1 = p 2 = 0 , 10 x ( x = 6 , 5 , 4 , 3 ) with the fixed N = 10 13 and the solid lines from right to left are acquired for different weak randomness parameters p 1 = p 2 = 0 , 10 x ( x = 6 , 5 , 4 , 3 ) with the fixed N = 10 15 . We can find that the impact of the weak randomness on final security key rate is greater than the finite total numbers of transmitting signals when p 1 = p 2 10 4 and the security key rate lines of two different N are approximately asymptotic. The impacts of the weak randomness on final security key rate is weaker than the finite total numbers of transmitting signals when p 1 = p 2 10 5 and the security key rate lines of two different N are not asymptotic. Moreover, the secret key rate cannot exceed the PLOB bound [11] when p 1 ( p 2 ) 10 6 with the finite-key size. In fact, temporal modes of photons become stretched due to the chromatic dispersion in the fiber. This phenomenon will impact the detection time windows. That is, the longer the fiber, the wider the time window should be. The duration of the secret key generation depends on the transmission distance as well as on the number of photons per pulse.
Finally, we compare and analyze the effects of weak randomness on different QKD protocols, BB84, MDI-QKD and SNS TF-QKD. We simulate the largest weak randomness vulnerability that different protocols can tolerate. As shown in Figure 5, the blue lines are results of MDI-QKD: the solid line is the result of both Alice and Bob existing the weak randomness and the dashed line is the result of one party existing the weak randomness. The black line is the result of the BB84 protocol. The red lines are results of SNS TF-QKD: the solid line is the result of both Alice and Bob existing the weak randomness and the dashed line is the result of one party existing the weak randomness. We find that the largest weak randomness vulnerability that SNS TF-QKD can tolerate is 10 2 which is greater than the BB84 and MDI-QKD 10 3 . Moreover, the achievable transmission distance is also longer than the BB84 protocol and the MDI-QKD protocol.
Actually, the probability that the states prepared by Alice (Bob) in the BB84 and the MDI-QKD reach the detector is η . For the SNS TF-QKD, it is η . Under the weak randomness model, in order to make sure not to be discovered, Eve may attenuate the quantum states from non-random part with a certain probability, which is related to the fiber transmittance η . The channel-loss dependence of the key rate in SNS TF-QKD is square root of channel transmittance R O η while it is linear in the BB84 and the MDI-QKD R O ( η ) , and that is why SNS TF-QKD can tolerate more weak randomness vulnerability than the BB84 protocol and the MDI-QKD. Compared with the BB84 protocol, the MDI-QKD is more sensitive to weak randomness which is rational since both Alice and Bob prepare quantum states. Compared with the MDI-QKD, the SNS TF-QKD is more robust to the weak randomness since just one party sends states and perform single photon interference in the quantum channel.
From the above simulation results, we can infer that SNS TF-QKD can still have the outstanding performance under the weak random condition. The secret key rate with the finite-key size is more sensitive to the weak randomness, and it performs differently for the different finite numbers of total pulses. Furthermore, SNS TF-QKD has an advantage of tolerance to the weak randomness compared to the BB84 protocol and the MDI-QKD protocol.

5. Conclusions

In this paper, we study the influence of weak randomness on the security of SNS TF-QKD in the asymptotic and the finite-key size case. Our simulation results indicate that in both cases, SNS TF-QKD can still have the prominent performance under the weak random condition: the secret key rate can exceed the PLOB bound and achieve long secure transmission distances. Moreover, the fluctuation of the final key rate with the finite-key size is greater than that in asymptotic cases, and because of Eve’s attenuation operation, the greater the number of total pulses, the more reduced the secure transmission distance. Additionally, the impact of the weak randomness on the final security key rate is greater than that with the finite total numbers of transmitting signals when p 1 = p 2 10 4 , and weaker when p 1 = p 2 10 5 . Under the weak randomness condition, SNS TF-QKD and MDI-QKD perform differently. The secret key rate of SNS TF-QKD still can surpass the PLOB bound when p 1 ( p 2 ) 10 6 with the finite-key size, and it cannot surpass the PLOB bound when p 1 ( p 2 ) 10 5 in the asymptotic case. MDI-QKD cannot generate a secure key when p 1 ( p 2 ) 10 3 , while SNS TF-QKD has an advantage of tolerating the weak randomness (up to 10 2 ).
We conclude that to avoid such an attack in the actual QKD systems, two aspects can be taken into account: (1) to make sure that the random numbers we use to encode, select bases, select time windows, and send or not send quantum states are as perfect as possible. We are supposed to use a better random number generator or random number generation algorithm, and (2) at the source side, we should ensure the reduction of the risk of the side channels, so as to avoid the distinguishability of the quantum states preparation in all degrees of freedom, such as the distinguishability between signal states and decoy states, and the distinguishability between perfect random states and weak random states. We can use two independent laser sources so that Alice and Bob have no incidental light, and hence there is no need to monitor the incident light as the implementations directly use seed light from Charlie. The imperfect IM will also produce the states distinguishability in the frequency domain. We can use more than one IM in the actual QKD systems. Furthermore, the narrow spectral filter and wavelength filter can also be used to the reduce states distinguishability and the threat of side channels.

Author Contributions

Conceptualization, X.-L.J.; methodology, X.-L.J. and Y.W.; software, X.-L.J. and Y.W.; validation, X.-L.J.; formal analysis, X.-L.J., Y.W. and Y.-F.L.; investigation, X.-L.J.; writing—original draft preparation, X.-L.J. and Y.W.; writing—review and editing, C.Z., J.-J.L. and W.-S.B.; supervision, W.-S.B.; project administration, W.-S.B.; funding acquisition, W.-S.B. and Y.W. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Natural Science Foundation of China (Grant No. 62101597), the National Key Research and Development Program of China (Grant No. 2020YFA0309702), the China Postdoctoral Science Foundation (Grant No. 2021M691536), the Natural Science Foundation of Henan (Grant No. 202300410534) and the Anhui Initiative in Quantum Information Technologies.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Bennett, C.H.; Brassard, G. Quantum Cryptography: Public Key Distribution and Coin Tossing. In Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing, Bangalore, India, 9–12 December 1984; pp. 175–179. [Google Scholar]
  2. Xu, F.; Ma, X.; Zhang, Q.; Lo, H.K.; Pan, J.W. Secure quantum key distribution with realistic devices. Rev. Mod. Phys. 2020, 92, 025002. [Google Scholar] [CrossRef]
  3. Li, H.W.; Wang, S.; Huang, J.Z.; Chen, W.; Yin, Z.Q.; Li, F.Y.; Zhou, Z.; Liu, D.; Zhang, Y.; Guo, G.C.; et al. Attacking a practical quantum-key-distribution system with wavelength-dependent beam-splitter and multiwavelength sources. Phys. Rev. A 2011, 84, 062308. [Google Scholar] [CrossRef]
  4. Lydersen, L.; Wiechers, C.; Wittmann, C.; Elser, D.; Skaar, J.; Makarov, V. Hacking commercial quantum cryptography systems by tailored bright illumination. Nat. Photonics 2010, 4, 686–689. [Google Scholar] [CrossRef]
  5. Qian, Y.J.; He, D.Y.; Wang, S.; Chen, W.; Yin, Z.Q.; Guo, G.C.; Han, Z.F. Robust countermeasure against detector control attack in a practical quantum key distribution system. Optica 2019, 6, 1178–1184. [Google Scholar] [CrossRef]
  6. Jain, N.; Anisimova, E.; Khan, I.; Makarov, V.; Marquardt, C.; Leuchs, G. Trojan-horse attacks threaten the security of practical quantum cryptography. New J. Phys. 2014, 16, 123030. [Google Scholar] [CrossRef]
  7. Lucamarini, M.; Choi, I.; Ward, M.B.; Dynes, J.F.; Yuan, Z.; Shields, A.J. Practical security bounds against the trojan-horse attack in quantum key distribution. Phys. Rev. X 2015, 5, 031030. [Google Scholar] [CrossRef]
  8. Lo, H.K.; Curty, M.; Qi, B. Measurement-device-independent quantum key distribution. Phys. Rev. Lett. 2012, 108, 130503. [Google Scholar] [CrossRef]
  9. Lucamarini, M.; Yuan, Z.L.; Dynes, J.F.; Shields, A.J. Overcoming the rate–distance limit of quantum key distribution without quantum repeaters. Nature 2018, 557, 400–403. [Google Scholar] [CrossRef]
  10. Xie, Y.M.; Lu, Y.S.; Weng, C.X.; Cao, X.Y.; Jia, Z.Y.; Bao, Y.; Wang, Y.; Fu, Y.; Yin, H.L.; Chen, Z.B. Breaking the rate-loss bound of quantum key distribution with asynchronous two-photon interference. PRX Quantum 2022, 3, 020315. [Google Scholar] [CrossRef]
  11. Pirandola, S.; Laurenza, R.; Ottaviani, C.; Banchi, L. Fundamental limits of repeaterless quantum communications. Nat. Commun. 2017, 8, 1–15. [Google Scholar] [CrossRef] [Green Version]
  12. Wang, X.B.; Yu, Z.W.; Hu, X.L. Twin-field quantum key distribution with large misalignment error. Phys. Rev. A 2018, 98, 062323. [Google Scholar] [CrossRef]
  13. Ma, X.; Zeng, P.; Zhou, H. Phase-matching quantum key distribution. Phys. Rev. X 2018, 8, 031043. [Google Scholar] [CrossRef]
  14. Cui, C.; Yin, Z.Q.; Wang, R.; Chen, W.; Wang, S.; Guo, G.C.; Han, Z.F. Twin-field quantum key distribution without phase postselection. Phys. Rev. Appl. 2019, 11, 034053. [Google Scholar] [CrossRef]
  15. Curty, M.; Azuma, K.; Lo, H.K. Simple security proof of twin-field type quantum key distribution protocol. npj Quantum Inf. 2019, 5, 1–6. [Google Scholar] [CrossRef]
  16. Jiang, C.; Yu, Z.W.; Hu, X.L.; Wang, X.B. Unconditional security of sending or not sending twin-field quantum key distribution with finite pulses. Phys. Rev. Appl. 2019, 12, 024061. [Google Scholar] [CrossRef]
  17. Yu, Z.W.; Hu, X.L.; Jiang, C.; Xu, H.; Wang, X.B. Sending-or-not-sending twin-field quantum key distribution in practice. Sci. Rep. 2019, 9, 1–8. [Google Scholar] [CrossRef]
  18. Zhou, X.Y.; Zhang, C.H.; Zhang, C.M.; Wang, Q. Asymmetric sending or not sending twin-field quantum key distribution in practice. Phys. Rev. A 2019, 99, 062316. [Google Scholar] [CrossRef]
  19. Hu, X.L.; Jiang, C.; Yu, Z.W.; Wang, X.B. Sending-or-not-sending twin-field protocol for quantum key distribution with asymmetric source parameters. Phys. Rev. A 2019, 100, 062337. [Google Scholar] [CrossRef]
  20. Xu, H.; Yu, Z.W.; Jiang, C.; Hu, X.L.; Wang, X.B. Sending-or-not-sending twin-field quantum key distribution: Breaking the direct transmission key rate. Phys. Rev. A 2020, 101, 042330. [Google Scholar] [CrossRef]
  21. Lu, Y.F.; Wang, Y.; Jiang, M.S.; Zhang, X.X.; Liu, F.; Li, H.W.; Zhou, C.; Tang, S.B.; Wang, J.Y.; Bao, W.S. Sending or Not-Sending Twin-Field Quantum Key Distribution with Flawed and Leaky Sources. Entropy 2021, 23, 1103. [Google Scholar] [CrossRef]
  22. Lu, Y.F.; Wang, Y.; Jiang, M.S.; Liu, F.; Zhang, X.X.; Bao, W.S. Finite-key analysis of sending-or-not-sending twin-field quantum key distribution with intensity fluctuations. Quantum Inf. Process. 2021, 20, 1–15. [Google Scholar] [CrossRef]
  23. Jiang, C.; Yu, Z.W.; Hu, X.L.; Wang, X.B. Robust twin-field quantum key distribution through sending-or-not-sending. Natl. Sci. Rev. 2022. [Google Scholar] [CrossRef]
  24. Jiang, C.; Hu, X.L.; Yu, Z.W.; Wang, X.B. Composable security for practical quantum key distribution with two way classical communication. New J. Phys. 2021, 23, 063038. [Google Scholar] [CrossRef]
  25. Jiang, C.; Hu, X.L.; Xu, H.; Yu, Z.W.; Wang, X.B. Zigzag approach to higher key rate of sending-or-not-sending twin field quantum key distribution with finite-key effects. New J. Phys. 2020, 22, 053048. [Google Scholar] [CrossRef]
  26. Liu, Y.; Yu, Z.W.; Zhang, W.; Guan, J.Y.; Chen, J.P.; Zhang, C.; Hu, X.L.; Li, H.; Jiang, C.; Lin, J.; et al. Experimental twin-field quantum key distribution through sending or not sending. Phys. Rev. Lett. 2019, 123, 100505. [Google Scholar] [CrossRef] [PubMed]
  27. Qiao, Y.; Chen, Z.; Zhang, Y.; Xu, B.; Guo, H. Sending-or-not-sending twin-field quantum key distribution with light source monitoring. Entropy 2019, 22, 36. [Google Scholar] [CrossRef] [PubMed]
  28. Chen, J.P.; Zhang, C.; Liu, Y.; Jiang, C.; Zhang, W.; Hu, X.L.; Guan, J.Y.; Yu, Z.W.; Xu, H.; Lin, J.; et al. Sending-or-not-sending with independent lasers: Secure twin-field quantum key distribution over 509 km. Phys. Rev. Lett. 2020, 124, 070501. [Google Scholar] [CrossRef] [PubMed]
  29. Pittaluga, M.; Minder, M.; Lucamarini, M.; Sanzaro, M.; Woodward, R.I.; Li, M.J.; Yuan, Z.; Shields, A.J. 600-km repeater-like quantum communications with dual-band stabilization. Nat. Photonics 2021, 15, 530–535. [Google Scholar] [CrossRef]
  30. Liu, H.; Jiang, C.; Zhu, H.T.; Zou, M.; Yu, Z.W.; Hu, X.L.; Xu, H.; Ma, S.; Han, Z.; Chen, J.P.; et al. Field test of twin-field quantum key distribution through sending-or-not-sending over 428 km. Phys. Rev. Lett. 2021, 126, 250502. [Google Scholar] [CrossRef]
  31. Chen, J.P.; Zhang, C.; Liu, Y.; Jiang, C.; Zhang, W.J.; Han, Z.Y.; Ma, S.Z.; Hu, X.L.; Li, Y.H.; Liu, H.; et al. Twin-field quantum key distribution over a 511 km optical fibre linking two distant metropolitan areas. Nat. Photonics 2021, 15, 570–575. [Google Scholar] [CrossRef]
  32. Li, H.W.; Yin, Z.Q.; Wang, S.; Qian, Y.J.; Chen, W.; Guo, G.C.; Han, Z.F. Randomness determines practical security of BB84 quantum key distribution. Sci. Rep. 2015, 5, 1–8. [Google Scholar] [CrossRef]
  33. Li, H.W.; Xu, Z.M.; Cai, Q.Y. Small imperfect randomness restricts security of quantum key distribution. Phys. Rev. A 2018, 98, 062325. [Google Scholar] [CrossRef]
  34. Sun, S.H.; Tian, Z.Y.; Zhao, M.S.; Ma, Y. Security evaluation of quantum key distribution with weak basis-choice flaws. Sci. Rep. 2020, 10, 1–8. [Google Scholar] [CrossRef] [PubMed]
  35. Zhang, C.M.; Wang, W.B.; Li, H.W.; Wang, Q. Weak randomness impacts the security of reference-frame-independent quantum key distribution. Opt. Lett. 2019, 44, 1226–1229. [Google Scholar] [CrossRef] [PubMed]
  36. Jiang, X.L.; Deng, X.Q.; Wang, Y.; Lu, Y.F.; Li, J.J.; Zhou, C.; Bao, W.S. Weak Randomness Analysis of Measurement-Device-Independent Quantum Key Distribution with Finite Resources. Photonics 2022, 9, 356. [Google Scholar] [CrossRef]
  37. Hwang, W.Y. Quantum key distribution with high loss: Toward global secure communication. Phys. Rev. Lett. 2003, 91, 057901. [Google Scholar] [CrossRef]
  38. Wang, X.B. Beating the photon-number-splitting attack in practical quantum cryptography. Phys. Rev. Lett. 2005, 94, 230503. [Google Scholar] [CrossRef]
  39. Lo, H.K.; Ma, X.; Chen, K. Decoy state quantum key distribution. Phys. Rev. Lett. 2005, 94, 230504. [Google Scholar] [CrossRef]
  40. Müller-Quade, J.; Renner, R. Composability in quantum cryptography. New J. Phys. 2009, 11, 085006. [Google Scholar] [CrossRef]
  41. Chernoff, H. A measure of asymptotic efficiency for tests of a hypothesis based on the sum of observations. Ann. Math. Stat. 1952, 23, 493–507. [Google Scholar] [CrossRef]
  42. Curty, M.; Xu, F.; Cui, W.; Lim, C.C.W.; Tamaki, K.; Lo, H.K. Finite-key analysis for measurement-device-independent quantum key distribution. Nat. Commun. 2014, 5, 1–7. [Google Scholar] [CrossRef] [PubMed]
  43. Zhang, Z.; Zhao, Q.; Razavi, M.; Ma, X. Improved key-rate bounds for practical decoy-state quantum-key-distribution systems. Phys. Rev. A 2017, 95, 012333. [Google Scholar] [CrossRef]
  44. Tomamichel, M.; Lim, C.C.W.; Gisin, N.; Renner, R. Tight finite-key analysis for quantum cryptography. Nat. Commun. 2012, 3, 1–6. [Google Scholar] [CrossRef] [PubMed]
Figure 1. (Color online) The optimal key rate (bits per pulse) in logarithmic scale versus transmission distance between Alice and Bob when the weak randomness exists for only one party (Alice or Bob) p 1 = 10 x ( x = 6 , 5 , 4 , 3 ) , p 2 = 0 (curves from right to left). The dashed lines are results of the asymptotic case, and the solid lines are the results of the finite-key size N = 10 15 . The gray dotted line is the PLOB bound.
Figure 1. (Color online) The optimal key rate (bits per pulse) in logarithmic scale versus transmission distance between Alice and Bob when the weak randomness exists for only one party (Alice or Bob) p 1 = 10 x ( x = 6 , 5 , 4 , 3 ) , p 2 = 0 (curves from right to left). The dashed lines are results of the asymptotic case, and the solid lines are the results of the finite-key size N = 10 15 . The gray dotted line is the PLOB bound.
Entropy 24 01339 g001
Figure 2. (Color online)The optimal key rate (bits per pulse) in logarithmic scale versus transmission distance between Alice and Bob when the weak randomness exists for two parties p 1 = p 2 = 10 x ( x = 6 , 5 , 4 , 3 ) (curves from right to left). The dashed lines are results of asymptotic cases and the solid lines are the results of the finite-key size N = 10 15 . The gray dotted line is the PLOB bound.
Figure 2. (Color online)The optimal key rate (bits per pulse) in logarithmic scale versus transmission distance between Alice and Bob when the weak randomness exists for two parties p 1 = p 2 = 10 x ( x = 6 , 5 , 4 , 3 ) (curves from right to left). The dashed lines are results of asymptotic cases and the solid lines are the results of the finite-key size N = 10 15 . The gray dotted line is the PLOB bound.
Entropy 24 01339 g002
Figure 3. (Color online)The optimal key rate (bits per pulse) in logarithmic scale versus transmission distance between Alice and Bob with weak randomness p 1 = p 2 = 10 6 and without weak randomness p 1 = p 2 = 0 for different N = 10 x ( x = 12 , 13 , 15 ) (curves from left to right), the dashed lines are results of weak randomness for different N, and the solid lines are the results of non-weak randomness for different N. The gray dotted line is the PLOB bound.
Figure 3. (Color online)The optimal key rate (bits per pulse) in logarithmic scale versus transmission distance between Alice and Bob with weak randomness p 1 = p 2 = 10 6 and without weak randomness p 1 = p 2 = 0 for different N = 10 x ( x = 12 , 13 , 15 ) (curves from left to right), the dashed lines are results of weak randomness for different N, and the solid lines are the results of non-weak randomness for different N. The gray dotted line is the PLOB bound.
Entropy 24 01339 g003
Figure 4. (Color online) The optimal key rate (bits per pulse) in logarithmic scale versus transmission distance between Alice and Bob with weak randomness p 1 = p 2 = 0 , 10 x ( x = 6 , 5 , 4 , 3 ) (curves from right to left) for different N = 10 13 , N = 10 15 , the dashed lines are results N = 10 13 with different weak randomness parameters, and the solid lines are the results of N = 10 15 with different weak randomness parameters. The gray dotted line is the PLOB bound.
Figure 4. (Color online) The optimal key rate (bits per pulse) in logarithmic scale versus transmission distance between Alice and Bob with weak randomness p 1 = p 2 = 0 , 10 x ( x = 6 , 5 , 4 , 3 ) (curves from right to left) for different N = 10 13 , N = 10 15 , the dashed lines are results N = 10 13 with different weak randomness parameters, and the solid lines are the results of N = 10 15 with different weak randomness parameters. The gray dotted line is the PLOB bound.
Entropy 24 01339 g004
Figure 5. (Color online)The optimal key rate (bits per pulse) in logarithmic scale versus transmission distance between Alice and Bob with weak randomness in the BB84 protocol, the MDI-QKD and the SNS TF-QKD. The blue lines are results weak randomness parameters, and the solid lines are the results of N = 10 15 with different weak randomness parameters.
Figure 5. (Color online)The optimal key rate (bits per pulse) in logarithmic scale versus transmission distance between Alice and Bob with weak randomness in the BB84 protocol, the MDI-QKD and the SNS TF-QKD. The blue lines are results weak randomness parameters, and the solid lines are the results of N = 10 15 with different weak randomness parameters.
Entropy 24 01339 g005
Table 1. List of experimental parameters applied in the numerical simulation in the following table: α is the the fiber loss coefficient (dB/km), f is the efficiency of error correction, η d is the efficiency of the detectors, e d is the probability of the optical misalignment error, p d is the dark count rate, and ε is the failure probability of statistical fluctuation analysis.
Table 1. List of experimental parameters applied in the numerical simulation in the following table: α is the the fiber loss coefficient (dB/km), f is the efficiency of error correction, η d is the efficiency of the detectors, e d is the probability of the optical misalignment error, p d is the dark count rate, and ε is the failure probability of statistical fluctuation analysis.
α f η d e d p d ε
0.2 1.1 80 % 0.15 1.0 × 10 10 1.0 × 10 10
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Jiang, X.-L.; Wang, Y.; Lu, Y.-F.; Li, J.-J.; Zhou, C.; Bao, W.-S. Security Analysis of Sending or Not-Sending Twin-Field Quantum Key Distribution with Weak Randomness. Entropy 2022, 24, 1339. https://doi.org/10.3390/e24101339

AMA Style

Jiang X-L, Wang Y, Lu Y-F, Li J-J, Zhou C, Bao W-S. Security Analysis of Sending or Not-Sending Twin-Field Quantum Key Distribution with Weak Randomness. Entropy. 2022; 24(10):1339. https://doi.org/10.3390/e24101339

Chicago/Turabian Style

Jiang, Xiao-Lei, Yang Wang, Yi-Fei Lu, Jia-Ji Li, Chun Zhou, and Wan-Su Bao. 2022. "Security Analysis of Sending or Not-Sending Twin-Field Quantum Key Distribution with Weak Randomness" Entropy 24, no. 10: 1339. https://doi.org/10.3390/e24101339

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop