Phase error rate estimation in QKD with imperfect detectors

Devashish Tupkary,Shlok Nahar,Pulkit Sinha,Norbert Lütkenhaus
2024-10-13
Abstract:We present a finite-size security proof of the decoy-state BB84 QKD protocol against coherent attacks, using entropic uncertainty relations, for imperfect detectors. We apply this result to the case of detectors with imperfectly characterized basis-efficiency mismatch. Our proof works by obtaining a suitable bound on the phase error rate, without requiring any new modifications to the protocol steps or hardware. It is applicable to imperfectly characterized detectors, and only requires the maximum relative difference in detection efficiencies and dark count rates of the detectors to be characterized. Moreover, our proof allows Eve to choose detector efficiencies and dark count rates in their allowed ranges in each round, thereby addressing an important problem of detector side channels. We prove security in the variable-length framework, where users are allowed to adaptively determine the length of key to be produced, and number of bits to be used for error-correction, based on observations made during the protocol. We quantitatively demonstrate the effect of basis-efficiency mismatch by applying our results to the decoy-state BB84 protocol.
Quantum Physics
What problem does this paper attempt to address?
This paper attempts to solve an important problem in the quantum key distribution (QKD) protocol, that is, how to estimate the phase error rate in the presence of imperfect detectors, and on this basis, provide a security proof under finite size. Specifically: 1. **Phase Error Rate Estimation**: The paper proposes a method that can still effectively estimate the phase error rate when the detectors have biases (for example, inconsistent efficiency and dark count rate). This is achieved by introducing two metrics, \( \delta_1 \) and \( \delta_2 \), to quantify the degree to which the detector performance deviates from the ideal situation, and then derive the upper bound of the phase error rate accordingly. 2. **Detector Side - Channel Vulnerability**: The paper addresses the problem of detector side - channel attacks, allowing the adversary Eve to control certain characteristics of the detectors (such as efficiency and dark count rate), but still being able to ensure the security of the protocol under reasonable assumptions. 3. **Variable - Length Security**: The paper also strictly proves the variable - length security of the BB84 protocol with decoy states in the framework of entropy uncertainty relations. This security allows Alice and Bob to adaptively determine the length of the generated key and the number of bits used for error correction according to the data observed during runtime, thereby improving the practical applicability of the protocol. ### Formula Summary - **Upper Bound of Phase Error Rate**: \[ \Pr\left(e_{\text{key}}^X \geq B_{\delta_1, \delta_2}(e_{\text{obs}}^X, n_X, n_K)\right) \leq \varepsilon_{\text{AT}} \] where \( e_{\text{key}}^X \) represents the phase error rate based on X, \( e_{\text{obs}}^X \) is the observed error rate, and \( n_X \) and \( n_K \) are the number of test rounds and key - generation rounds respectively. - **Variable - Length Key Length**: \[ l(n_X, n_K, e_{\text{obs}}^X, e_{\text{obs}}^Z) := \max\left(0, n_k - h(B_{\delta_1, \delta_2}(e_{\text{obs}}^X, n_X, n_K)) - \lambda_{\text{EC}}(n_X, n_K, e_{\text{obs}}^X, e_{\text{obs}}^Z) - 2 \log\left(\frac{1}{2\varepsilon_{\text{PA}}}\right) - \log\left(\frac{2}{\varepsilon_{\text{EV}}}\right)\right) \] where \( h(x) \) is the binary entropy function, \( \lambda_{\text{EC}} \) is the number of bits used for error correction, and \( \varepsilon_{\text{PA}} \) and \( \varepsilon_{\text{EV}} \) are the security parameters for privacy amplification and error verification respectively. ### Conclusion By introducing a new phase error rate estimation method and strict mathematical proofs, this paper solves the security problems caused by imperfect detectors in QKD and provides theoretical support for practical applications. This not only improves the feasibility of the QKD protocol in real - world environments but also lays the foundation for future experimental and theoretical research.