A new method controlling the error probability for detecting the
photon-number-splitting attack in the decoy-state quantum key distribution
- URL: http://arxiv.org/abs/2012.11387v5
- Date: Fri, 1 Apr 2022 02:57:49 GMT
- Title: A new method controlling the error probability for detecting the
photon-number-splitting attack in the decoy-state quantum key distribution
- Authors: Xiao-Ming Chen, Lei Chen, Ya-Long Yan and Yan-Lin Tang
- Abstract summary: In this paper, under the null hypothesis of no PNS attack, we first determine whether there is an attack or not.
If the result is judged to be an attack, we can use the existing decoy-state method and the GLLP formula to estimate secure key rate.
Otherwise, all pulses received including both single-photon pulses and multiphoton pulses, can be used to generate the keys.
- Score: 9.081501177870487
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: The existing decoy-state quantum key distribution (QKD) beating
photon-number-splitting (PNS) attack provides a more accurate method to
estimate secure key rate, while it still considers that only single-photon
pulses can generate secure keys in any case. However, multiphoton pulses can
also generate secure keys if we can confirm that there is no attack. In this
paper, under the null hypothesis of no PNS attack, we first determine whether
there is an attack or not by retrieving the missing information of the existing
decoy-state protocols, extract a Cauchy distribution statistic, and further
provide a detection method and the Type I error probability. If the result is
judged to be an attack, we can use the existing decoy-state method and the GLLP
formula to estimate secure key rate. Otherwise, all pulses received including
both single-photon pulses and multiphoton pulses, can be used to generate the
keys and we give the secure key rate in this case. Finally, the associated
experiments we performed (i.e., the significance level is $5\%$) show the
correctness of our method.
Related papers
- WPDA: Frequency-based Backdoor Attack with Wavelet Packet Decomposition [30.199136831047063]
This work explores an emerging security threat against deep neural networks (DNNs) based image classification, i.e., backdoor attack.
We propose a novel frequency-based backdoor attack via Wavelet Packet Decomposition (WPD)
Our method is stealthy and precise, evidenced by the 98.12% Attack Success Rate (ASR) on CIFAR-10 with the extremely low poisoning ratio 0.004%.
arXiv Detail & Related papers (2024-01-24T16:43:35Z) - Mitigating the source-side channel vulnerability by characterization of
photon statistics [1.3458279593461016]
Quantum key distribution (QKD) theoretically offers unconditional security.
Unfortunately, the gap between theory and practice threatens side-channel attacks on practical QKD systems.
We aim to bridge the gap between theory and practice to achieve information-theoretic security.
arXiv Detail & Related papers (2023-08-28T08:37:59Z) - Quantum Key Distribution Using a Quantum Emitter in Hexagonal Boron
Nitride [48.97025221755422]
We demonstrate a room temperature, discrete-variable quantum key distribution system using a bright single photon source in hexagonal-boron nitride.
We have generated keys with one million bits length, and demonstrated a secret key of approximately 70,000 bits, at a quantum bit error rate of 6%.
Our work demonstrates the first proof of concept finite-key BB84 QKD system realised with hBN defects.
arXiv Detail & Related papers (2023-02-13T09:38:51Z) - Certified randomness in tight space [28.7482666629286]
We provide a method for certified randomness generation on a small-scale application-ready device.
We demonstrate a 2-qubit photonic device that achieves the highest standard in randomness yet is cut out for real-world applications.
arXiv Detail & Related papers (2023-01-09T17:34:48Z) - Efficient room-temperature molecular single-photon sources for quantum
key distribution [51.56795970800138]
Quantum Key Distribution (QKD) allows the distribution of cryptographic keys between multiple users in an information-theoretic secure way.
We introduce and demonstrate a proof-of-concept QKD system exploiting a molecule-based single-photon source operating at room temperature and emitting at 785nm.
arXiv Detail & Related papers (2022-02-25T11:52:10Z) - Fully passive entanglement based quantum key distribution scheme [2.7550995784117283]
We propose a fully passive entanglement based QKD scheme in which certified random bits for privacy amplification are extracted.
The idea of extracting certified random numbers from measurement-basis-mismatched photons can be extended to all practical QKD schemes.
arXiv Detail & Related papers (2021-11-05T01:37:11Z) - Round-robin differential phase-time-shifting protocol for quantum key
distribution: theory and experiment [58.03659958248968]
Quantum key distribution (QKD) allows the establishment of common cryptographic keys among distant parties.
Recently, a QKD protocol that circumvents the need for monitoring signal disturbance, has been proposed and demonstrated in initial experiments.
We derive the security proofs of the round-robin differential phase-time-shifting protocol in the collective attack scenario.
Our results show that the RRDPTS protocol can achieve higher secret key rate in comparison with the RRDPS, in the condition of high quantum bit error rate.
arXiv Detail & Related papers (2021-03-15T15:20:09Z) - Security of the decoy state method for quantum key distribution [0.0]
Quantum cryptography or, more precisely, quantum key distribution (QKD) is one of the advanced areas in the field of quantum technologies.
This paper is devoted to the decoy state method, a countermeasure against vulnerabilities caused by the use of coherent states of light for QKD protocols.
arXiv Detail & Related papers (2021-01-25T14:33:04Z) - Noiseless attack and counterfactual security of quantum key distribution [0.0]
We show that the efficiency of counterfactual QKD protocols can be enhanced by including non-counterfactual bits.
We show how this problem can be resolved in a simple way, whereby the non-counterfactual key bits are indicated to be secure.
This method of enhancing the key rate is shown to be applicable to various existing quantum counterfactual key distribution protocols.
arXiv Detail & Related papers (2020-12-09T16:48:43Z) - Backflash Light as a Security Vulnerability in Quantum Key Distribution
Systems [77.34726150561087]
We review the security vulnerabilities of quantum key distribution (QKD) systems.
We mainly focus on a particular effect known as backflash light, which can be a source of eavesdropping attacks.
arXiv Detail & Related papers (2020-03-23T18:23:12Z) - Hacking single-photon avalanche detector in quantum key distribution via
pulse illumination [6.285329211368446]
We show an adversary's capability of exploiting the imperfection of the patch itself to bypass the patch.
We also analyze the secret key rate under the pulse illumination attack, which theoretically confirmed that Eve can conduct the attack to learn the secret key.
arXiv Detail & Related papers (2020-02-21T06:05:18Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.