Open-destination measurement-device-independent quantum key distribution
network
- URL: http://arxiv.org/abs/2009.13439v2
- Date: Tue, 29 Sep 2020 01:54:48 GMT
- Title: Open-destination measurement-device-independent quantum key distribution
network
- Authors: Wen-Fei Cao, Yi-Zheng Zhen, Yu-Lin Zheng, Shuai Zhao, Feihu Xu, Li Li,
Zeng-Bing Chen, Nai-Le Liu and Kai Chen
- Abstract summary: Quantum key distribution (QKD) networks hold promise for sharing secure randomness over multi-partities.
Here, we propose an open-destination measurement-device-independent QKD network.
The scheme enjoys security against untrusted relays and all detector side-channel attacks.
- Score: 10.480419551094071
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Quantum key distribution (QKD) networks hold promise for sharing secure
randomness over multi-partities. Most existing QKD network schemes and
demonstrations are based on trusted relays or limited to point-to-point
scenario. Here, we propose a flexible and extensible scheme named as
open-destination measurement-device-independent QKD network. The scheme enjoys
security against untrusted relays and all detector side-channel attacks.
Particularly, any users can accomplish key distribution under assistance of
others in the network. As an illustration, we show in detail a four-user
network where two users establish secure communication and present realistic
simulations by taking into account imperfections of both sources and detectors.
Related papers
- Practical hybrid PQC-QKD protocols with enhanced security and performance [44.8840598334124]
We develop hybrid protocols by which QKD and PQC inter-operate within a joint quantum-classical network.
In particular, we consider different hybrid designs that may offer enhanced speed and/or security over the individual performance of either approach.
arXiv Detail & Related papers (2024-11-02T00:02:01Z) - Guarantees on the structure of experimental quantum networks [109.08741987555818]
Quantum networks connect and supply a large number of nodes with multi-party quantum resources for secure communication, networked quantum computing and distributed sensing.
As these networks grow in size, certification tools will be required to answer questions regarding their properties.
We demonstrate a general method to guarantee that certain correlations cannot be generated in a given quantum network.
arXiv Detail & Related papers (2024-03-04T19:00:00Z) - Practical quantum secure direct communication with squeezed states [55.41644538483948]
We report the first table-top experimental demonstration of a CV-QSDC system and assess its security.
This realization paves the way into future threat-less quantum metropolitan networks, compatible with coexisting advanced wavelength division multiplexing (WDM) systems.
arXiv Detail & Related papers (2023-06-25T19:23:42Z) - Distributed Information-theoretical Secure Protocols for Quantum Key
Distribution Networks against Malicious Nodes [15.200383830307915]
Quantum key distribution (QKD) networks are expected to enable information-theoretical secure (ITS) communication over a large-scale network.
Current research on QKD networks primarily addresses passive attacks conducted by malicious nodes such as eavesdropping.
We suggest a novel paradigm, inspired by distributed systems, to address the active attack by collaborate malicious nodes in QKD networks.
arXiv Detail & Related papers (2023-02-14T11:53:22Z) - High-Rate Point-to-Multipoint Quantum Key Distribution using Coherent
States [6.058240259980149]
Quantum key distribution (QKD) which enables information-theoretically security is now heading towards quantum secure networks.
It requires high-performance and cost-effective protocols while increasing the number of users.
Here, we show a 'protocol solution' using continuous-variable quantum information.
arXiv Detail & Related papers (2023-02-05T14:21:33Z) - A scheme for multipartite entanglement distribution via separable
carriers [68.8204255655161]
We develop a strategy for entanglement distribution via separable carriers that can be applied to any number of network nodes.
We show that our protocol results in multipartite entanglement, while the carrier mediating the process is always in a separable state with respect to the network.
arXiv Detail & Related papers (2022-06-20T10:50:45Z) - An Information-theoretical Secured Byzantine-fault Tolerance Consensus
in Quantum Key Distribution Network [13.007691543559666]
Quantum key distribution (QKD) networks are expected to provide information-theoretical secured (ITS) communication over long distances.
We propose an ITS Byzantine-fault tolerance (BFT) QKD network scheme to achieve end-to-end key distribution based on point-to-point QKD links.
We theoretically analyze proposed ITSBFT-QKD network scheme from four aspects: QKD key distribution security, temporary signature security, consensus security, and leader election fairness.
arXiv Detail & Related papers (2022-04-21T01:04:39Z) - Realizing downstream access network using continuous-variable quantum
key distribution [15.570105300801247]
Quantum key distribution (QKD) enables the secure distribution of symmetric keys between two legitimate parties.
Access network that connects multiple end-users with one network backbone can be combined with QKD to build security for end-users.
In this paper, we prove that downstream access network can also be constructed by using continuous-variable (CV) QKD.
arXiv Detail & Related papers (2021-07-05T05:36:07Z) - Sharing classical secrets with continuous-variable entanglement:
Composable security and network coding advantage [0.913755431537592]
We show that multi-partite entangled resources achieve a genuine advantage over point-to-point protocols for quantum communication.
This is the first concrete compelling examples of multi-partite entangled resources achieving a genuine advantage over point-to-point protocols for quantum communication.
arXiv Detail & Related papers (2021-04-21T17:37:28Z) - Enabling certification of verification-agnostic networks via
memory-efficient semidefinite programming [97.40955121478716]
We propose a first-order dual SDP algorithm that requires memory only linear in the total number of network activations.
We significantly improve L-inf verified robust accuracy from 1% to 88% and 6% to 40% respectively.
We also demonstrate tight verification of a quadratic stability specification for the decoder of a variational autoencoder.
arXiv Detail & Related papers (2020-10-22T12:32:29Z) - Backflash Light as a Security Vulnerability in Quantum Key Distribution
Systems [77.34726150561087]
We review the security vulnerabilities of quantum key distribution (QKD) systems.
We mainly focus on a particular effect known as backflash light, which can be a source of eavesdropping attacks.
arXiv Detail & Related papers (2020-03-23T18:23:12Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.