Noiseless attack and counterfactual security of quantum key distribution
- URL: http://arxiv.org/abs/2012.05157v3
- Date: Mon, 6 Sep 2021 15:53:01 GMT
- Title: Noiseless attack and counterfactual security of quantum key distribution
- Authors: Vinod N. Rao and R. Srikanth
- Abstract summary: We show that the efficiency of counterfactual QKD protocols can be enhanced by including non-counterfactual bits.
We show how this problem can be resolved in a simple way, whereby the non-counterfactual key bits are indicated to be secure.
This method of enhancing the key rate is shown to be applicable to various existing quantum counterfactual key distribution protocols.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Counterfactual quantum key distribution (QKD) enables two parties to share a
secret key using an interaction-free measurement. Here, we point out that the
efficiency of counterfactual QKD protocols can be enhanced by including
non-counterfactual bits. This inclusion potentially gives rise to the
possibility of noiseless attacks, in which Eve can gain knowledge of the key
bits without introducing any errors in the quantum channel. We show how this
problem can be resolved in a simple way that naturally leads to the idea of
"counterfactual security", whereby the non-counterfactual key bits are
indicated to be secure by counterfactual detections. This method of enhancing
the key rate is shown to be applicable to various existing quantum
counterfactual key distribution protocols, increasing their efficiency without
weakening their security.
Related papers
- A Secure Quantum Key Distribution Protocol Using Two-Particle Transmission [0.0]
Unextendible Product Bases (UPBs) hold promise in quantum cryptography due to their inherent indistinguishability.
This work introduces a protocol utilizing UPBs to establish quantum keys between distant parties.
arXiv Detail & Related papers (2024-03-20T14:33:17Z) - Efficient Device-Independent Quantum Key Distribution [4.817429789586127]
Device-independent quantum key distribution (DIQKD) is a key distribution scheme whose security is based on the laws of quantum physics.
We propose an efficient device-independent quantum key distribution protocol in which one participant prepares states and transmits them to another participant.
arXiv Detail & Related papers (2023-11-16T13:01:34Z) - Secure Key from Quantum Discord [22.97866257572447]
We show how to make use of discord to analyze security in a specific quantum cryptography protocol.
Our method is robust against imperfections in qubit sources and qubit measurements as well as basis misalignment due to quantum channels.
arXiv Detail & Related papers (2023-04-12T14:21:49Z) - Phase-Matching Quantum Key Distribution without Intensity Modulation [25.004151934190965]
We propose a phase-matching quantum key distribution protocol without intensity modulation.
Simulation results show that the transmission distance of our protocol could reach 305 km in telecommunication fiber.
Our protocol provides a promising solution for constructing quantum networks.
arXiv Detail & Related papers (2023-03-21T04:32:01Z) - Revocable Cryptography from Learning with Errors [61.470151825577034]
We build on the no-cloning principle of quantum mechanics and design cryptographic schemes with key-revocation capabilities.
We consider schemes where secret keys are represented as quantum states with the guarantee that, once the secret key is successfully revoked from a user, they no longer have the ability to perform the same functionality as before.
arXiv Detail & Related papers (2023-02-28T18:58:11Z) - One-Time Universal Hashing Quantum Digital Signatures without Perfect
Keys [24.240914319917053]
We show that imperfect quantum keys with limited information leakage can be used for digital signatures and authentication without compromising security.
This study significantly reduces the delay for data postprocessing and is compatible with any quantum key generation protocols.
arXiv Detail & Related papers (2023-01-03T14:54:27Z) - Upper bounds on key rates in device-independent quantum key distribution
based on convex-combination attacks [1.118478900782898]
We present the convex-combination attack as an efficient, easy-to-use technique for upper-bounding DIQKD key rates.
It allows verifying the accuracy of lower bounds on key rates for state-of-the-art protocols.
arXiv Detail & Related papers (2022-06-13T15:27:48Z) - Authentication of quantum key distribution with post-quantum
cryptography and replay attacks [1.8476815769956565]
Quantum key distribution (QKD) and post-quantum cryptography (PQC) are two cryptographic mechanisms with quantum-resistant security.
We propose two protocols based on PQC to realize the full authentication of QKD data post-processing.
arXiv Detail & Related papers (2022-06-02T17:29:34Z) - Foiling zero-error attacks against coherent-one-way quantum key
distribution [0.0]
coherent-one-way (COW) QKD is commercially available.
It has been shown very recently that its secret key rate scales quadratically with the channel transmittance.
We study various countermeasures to foil zero-error attacks against COW-QKD.
arXiv Detail & Related papers (2021-08-27T17:01:14Z) - Tight finite-key analysis for generalized high-dimensional quantum key
distribution [23.578892457164933]
We propose a tight finite-key analysis suitable for generalized high-dimensional quantum key distribution protocols.
Benefitting from our theory, high-dimensional quantum key distribution protocols with finite resources become experimentally feasible.
arXiv Detail & Related papers (2020-08-08T12:33:53Z) - Backflash Light as a Security Vulnerability in Quantum Key Distribution
Systems [77.34726150561087]
We review the security vulnerabilities of quantum key distribution (QKD) systems.
We mainly focus on a particular effect known as backflash light, which can be a source of eavesdropping attacks.
arXiv Detail & Related papers (2020-03-23T18:23:12Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.