Security of quantum key distribution with detection-efficiency mismatch
in the multiphoton case
- URL: http://arxiv.org/abs/2004.07809v3
- Date: Mon, 18 Jul 2022 18:27:48 GMT
- Title: Security of quantum key distribution with detection-efficiency mismatch
in the multiphoton case
- Authors: Anton Trushechkin
- Abstract summary: Current security of QKD with detection-efficiency mismatch rely on the assumption of the single-photon light source on the sender side or on the assumption of the single-photon input of the receiver side.
Here we present a rigorous security proof without these assumptions and, thus, solve this important problem and prove the security of QKD with detection-efficiency mismatch against general attacks.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Detection-efficiency mismatch is a common problem in practical quantum key
distribution (QKD) systems. Current security proofs of QKD with
detection-efficiency mismatch rely either on the assumption of the
single-photon light source on the sender side or on the assumption of the
single-photon input of the receiver side. These assumptions impose restrictions
on the class of possible eavesdropping strategies. Here we present a rigorous
security proof without these assumptions and, thus, solve this important
problem and prove the security of QKD with detection-efficiency mismatch
against general attacks (in the asymptotic regime). In particular, we adapt the
decoy state method to the case of detection-efficiency mismatch.
Related papers
- Loss-tolerant quantum key distribution with detection efficiency mismatch [39.58317527488534]
We establish a security proof for the loss-tolerant P&M QKD protocol that incorporates imperfections in both the source and the detectors.
Specifically, we demonstrate the security of this scheme when the emitted states deviate from the ideal ones.
arXiv Detail & Related papers (2024-12-12T19:01:56Z) - Characterising higher-order phase correlations in gain-switched laser sources with application to quantum key distribution [38.00713966087315]
Multi-photon emissions in laser sources represent a serious threat for the security of quantum key distribution.
We introduce experimental schemes to characterise the phase probability distribution of the emitted pulses.
We demonstrate that an optimisation task over interferometric measures suffices in determining the impact of arbitrary order correlations.
arXiv Detail & Related papers (2024-12-04T22:06:13Z) - Quantum Key Distribution with Basis-Dependent Detection Probability [0.0]
A common assumption in security proofs is that the detection probability at the receiver, for a given input state, is independent of the measurement basis.
This paper presents a security proof for QKD protocols that does not rely on the above assumption.
We demonstrate, through simulations, that our proof can extract positive key rates for setups vulnerable to large detection probability mismatches.
arXiv Detail & Related papers (2024-11-29T17:35:27Z) - Practical hybrid PQC-QKD protocols with enhanced security and performance [44.8840598334124]
We develop hybrid protocols by which QKD and PQC inter-operate within a joint quantum-classical network.
In particular, we consider different hybrid designs that may offer enhanced speed and/or security over the individual performance of either approach.
arXiv Detail & Related papers (2024-11-02T00:02:01Z) - Security of entanglement-based QKD with realistic parametric
down-conversion sources [0.0]
The paper analyzes security aspects of practical entanglement-based quantum key distribution (QKD)
We show that this effect does not impair the security of entanglement-based QKD systems.
arXiv Detail & Related papers (2023-07-04T17:25:26Z) - Quantum Key Distribution Using a Quantum Emitter in Hexagonal Boron
Nitride [48.97025221755422]
We demonstrate a room temperature, discrete-variable quantum key distribution system using a bright single photon source in hexagonal-boron nitride.
We have generated keys with one million bits length, and demonstrated a secret key of approximately 70,000 bits, at a quantum bit error rate of 6%.
Our work demonstrates the first proof of concept finite-key BB84 QKD system realised with hBN defects.
arXiv Detail & Related papers (2023-02-13T09:38:51Z) - Efficient room-temperature molecular single-photon sources for quantum
key distribution [51.56795970800138]
Quantum Key Distribution (QKD) allows the distribution of cryptographic keys between multiple users in an information-theoretic secure way.
We introduce and demonstrate a proof-of-concept QKD system exploiting a molecule-based single-photon source operating at room temperature and emitting at 785nm.
arXiv Detail & Related papers (2022-02-25T11:52:10Z) - Security of the decoy state method for quantum key distribution [0.0]
Quantum cryptography or, more precisely, quantum key distribution (QKD) is one of the advanced areas in the field of quantum technologies.
This paper is devoted to the decoy state method, a countermeasure against vulnerabilities caused by the use of coherent states of light for QKD protocols.
arXiv Detail & Related papers (2021-01-25T14:33:04Z) - Security proof of practical quantum key distribution with
detection-efficiency mismatch [3.1988884923120313]
We develop a method that allows to provide security proofs without the usual assumption.
Our method can take the detection-efficiency mismatch into account without having to restrict the attack strategy of the adversary.
Our method also shows that in the absence of efficiency mismatch in our detector model, the key rate increases if the loss due to detection inefficiency is assumed to be outside of the adversary's control.
arXiv Detail & Related papers (2020-04-09T06:49:29Z) - Backflash Light as a Security Vulnerability in Quantum Key Distribution
Systems [77.34726150561087]
We review the security vulnerabilities of quantum key distribution (QKD) systems.
We mainly focus on a particular effect known as backflash light, which can be a source of eavesdropping attacks.
arXiv Detail & Related papers (2020-03-23T18:23:12Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.