Secure quantum key distribution with a subset of malicious devices
- URL: http://arxiv.org/abs/2006.14337v2
- Date: Fri, 5 Feb 2021 12:01:21 GMT
- Title: Secure quantum key distribution with a subset of malicious devices
- Authors: V\'ictor Zapatero and Marcos Curty
- Abstract summary: Malicious manipulation of quantum key distribution (QKD) hardware is a serious threat to its security.
One possible approach to re-establish the security of QKD is to use a redundant number of devices.
We introduce an efficient distributed QKD post-processing protocol and prove its security in a variety of corruption models of the possibly malicious devices.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: The malicious manipulation of quantum key distribution (QKD) hardware is a
serious threat to its security, as, typically, neither end users nor QKD
manufacturers can validate the integrity of every component of their QKD system
in practice. One possible approach to re-establish the security of QKD is to
use a redundant number of devices. Following this idea, we introduce an
efficient distributed QKD post-processing protocol and prove its security in a
variety of corruption models of the possibly malicious devices. We find that,
compared to the most conservative model of active and collaborative corrupted
devices, natural assumptions lead to a significant enhancement of the secret
key rate and considerably simpler QKD setups. Furthermore, we show that, for
most practical situations, the resulting finite-size secret key rate is similar
to that of the standard scenario assuming trusted devices.
Related papers
- High-Fidelity Coherent-One-Way QKD Simulation Framework for 6G Networks: Bridging Theory and Reality [105.73011353120471]
Quantum key distribution (QKD) has been emerged as a promising solution for guaranteeing information-theoretic security.
Due to the considerable high-cost of QKD equipment, a lack of QKD communication system design tools is challenging.
This paper introduces a QKD communication system design tool.
arXiv Detail & Related papers (2025-01-21T11:03:59Z) - Loss-tolerant quantum key distribution with detection efficiency mismatch [39.58317527488534]
We establish a security proof for the loss-tolerant P&M QKD protocol that incorporates imperfections in both the source and the detectors.
Specifically, we demonstrate the security of this scheme when the emitted states deviate from the ideal ones.
arXiv Detail & Related papers (2024-12-12T19:01:56Z) - Practical hybrid PQC-QKD protocols with enhanced security and performance [44.8840598334124]
We develop hybrid protocols by which QKD and PQC inter-operate within a joint quantum-classical network.
In particular, we consider different hybrid designs that may offer enhanced speed and/or security over the individual performance of either approach.
arXiv Detail & Related papers (2024-11-02T00:02:01Z) - Coding-Based Hybrid Post-Quantum Cryptosystem for Non-Uniform Information [53.85237314348328]
We introduce for non-uniform messages a novel hybrid universal network coding cryptosystem (NU-HUNCC)
We show that NU-HUNCC is information-theoretic individually secured against an eavesdropper with access to any subset of the links.
arXiv Detail & Related papers (2024-02-13T12:12:39Z) - Practical quantum secure direct communication with squeezed states [55.41644538483948]
We report the first table-top experimental demonstration of a CV-QSDC system and assess its security.
This realization paves the way into future threat-less quantum metropolitan networks, compatible with coexisting advanced wavelength division multiplexing (WDM) systems.
arXiv Detail & Related papers (2023-06-25T19:23:42Z) - A security framework for quantum key distribution implementations [1.2815904071470707]
We present a security proof in the finite-key regime against coherent attacks.
Our proof requires minimal state characterization, which facilitates its application to real-life implementations.
arXiv Detail & Related papers (2023-05-10T07:02:32Z) - Simple and Rigorous Proof Method for the Security of Practical Quantum
Key Distribution in the Single-Qubit Regime Using Mismatched Basis
Measurements [0.2519906683279153]
Quantum key distribution (QKD) protocols aim at allowing two parties to generate a secret shared key.
While many QKD protocols have been proven unconditionally secure in theory, practical security analyses of experimental QKD implementations typically do not take into account all possible loopholes.
We present a simple method of computing secure key rates for any practical implementation of discrete-variable QKD.
arXiv Detail & Related papers (2022-08-29T17:37:58Z) - Improved coherent one-way quantum key distribution for high-loss
channels [0.0]
We present a simple variant of COW-QKD and prove its security in the infinite-key limit.
Remarkably, the resulting key rate of our protocol is comparable with both the existing upper-bound on COW-QKD key rate and the secure key rate of the coherent-state BB84 protocol.
arXiv Detail & Related papers (2022-06-17T00:07:03Z) - Improved Finite-Key Security Analysis of Quantum Key Distribution
Against Trojan-Horse Attacks [0.0]
Most security proofs of quantum key distribution (QKD) disregard the effect of information leakage from the users' devices.
In a Trojan-horse attack, the eavesdropper injects strong light into the QKD apparatuses, and then analyzes the back-reflected light to learn information about their internal setting choices.
We derive finite-key security bounds for decoy-state-based QKD schemes in the presence of THAs, which significantly outperform previous analyses.
arXiv Detail & Related papers (2022-02-14T11:35:26Z) - Experimental quantum key distribution secure against malicious devices [12.212011208103783]
We implement a 1.25 GHz chip-based measurement-device-independent QKD system secure against malicious devices on the measurement and the users' sides.
The secret key rate reaches 137 bps over a 24 dB channel loss.
arXiv Detail & Related papers (2020-06-23T09:54:02Z) - Backflash Light as a Security Vulnerability in Quantum Key Distribution
Systems [77.34726150561087]
We review the security vulnerabilities of quantum key distribution (QKD) systems.
We mainly focus on a particular effect known as backflash light, which can be a source of eavesdropping attacks.
arXiv Detail & Related papers (2020-03-23T18:23:12Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.