Abstract:The quantum key distribution (QKD) allows two remote users to share a common information-theoretic secure secret key. In order to guarantee the security of a practical QKD implementation, the physical system has to be fully characterized and all deviations from the ideal protocol due to various imperfections of realistic devices have to be taken into account in the security proof. In this work, we study the security of the efficient decoy-state BB84 QKD protocol in the presence of source flaws, caused by imperfect intensity and polarization modulation. We investigate the non-Poissonian photon-number statistics due to coherent-state intensity fluctuations and the basis-dependence of the source due to non-ideal polarization state preparation. The analysis is supported by experimental characterization of intensity and phase distributions.
What problem does this paper attempt to address?
The problem that this paper attempts to solve is the security vulnerability issue in actual quantum key distribution (QKD) systems due to the imperfection of source devices. Specifically, the paper focuses on how to evaluate the security of the system when using the efficient decoy - state method with imperfect state preparation in the BB84 protocol. These problems mainly include:
1. **Non - Poisson photon number statistics**: Non - Poisson photon number statistics caused by coherent - state intensity fluctuations, which will affect the estimation of single - photon yield and bit - error rate.
2. **Polarization dependence**: Due to the non - ideal polarization state preparation, the source device behaves differently in different bases, which may enable a potential eavesdropper (Eve) to distinguish different bases and thus attack these base states separately.
3. **Inaccuracy of intensity and phase modulation**: The inaccuracy of the intensity modulator and the phase modulator used in the experiment will lead to intensity fluctuations of the signal and the decoy state, as well as deviation of the polarization state.
### Main research contents
1. **Influence of non - Poisson photon number statistics**:
- The non - Poisson photon number statistics caused by the inaccuracy of the intensity modulator was studied, and the intensity distribution was measured experimentally.
- A modified single - photon probability formula was proposed, and its influence on the key generation rate was analyzed.
2. **Influence of polarization dependence**:
- The distribution of polarization states was measured experimentally, and the influence of these distributions on base dependence was analyzed.
- Using the concept of a quantum coin, the upper bound of the single - photon phase - error rate was derived, and its influence on the key generation rate was evaluated.
3. **Experimental verification**:
- A simplified optical scheme was constructed to simulate the characteristics of actual commercial QKD devices, and the intensity and phase distributions were extracted.
- The correctness of the theoretical model was verified by experimental data, and the key generation rate under different conditions was evaluated.
### Conclusion
Through theoretical analysis and experimental verification, the paper shows the importance of considering the imperfection of source devices in ensuring the security of actual QKD systems. Specifically, the paper proposes improved key generation rate formulas and verifies the effectiveness of these formulas through experimental data. The research results show that even in the presence of source device imperfections, the security of the QKD system can be ensured through appropriate analysis methods.