Security of the decoy state method for quantum key distribution
- URL: http://arxiv.org/abs/2101.10128v2
- Date: Sat, 27 Mar 2021 07:30:39 GMT
- Title: Security of the decoy state method for quantum key distribution
- Authors: A.S. Trushechkin, E.O. Kiktenko, D.A. Kronberg, A.K. Fedorov
- Abstract summary: Quantum cryptography or, more precisely, quantum key distribution (QKD) is one of the advanced areas in the field of quantum technologies.
This paper is devoted to the decoy state method, a countermeasure against vulnerabilities caused by the use of coherent states of light for QKD protocols.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Quantum cryptography or, more precisely, quantum key distribution (QKD), is
one of the advanced areas in the field of quantum technologies. The
confidentiality of keys distributed with the use of QKD protocols is guaranteed
by the fundamental laws of quantum mechanics. This paper is devoted to the
decoy state method, a countermeasure against vulnerabilities caused by the use
of coherent states of light for QKD protocols whose security is proved under
the assumption of single-photon states. We give a formal security proof of the
decoy state method against all possible attacks. We compare two widely known
attacks on multiphoton pulses: photon-number splitting and beam splitting.
Finally, we discuss the equivalence of polarization and phase coding.
Related papers
- Single-Round Proofs of Quantumness from Knowledge Assumptions [41.94295877935867]
A proof of quantumness is an efficiently verifiable interactive test that an efficient quantum computer can pass.
Existing single-round protocols require large quantum circuits, whereas multi-round ones use smaller circuits but require experimentally challenging mid-circuit measurements.
We construct efficient single-round proofs of quantumness based on existing knowledge assumptions.
arXiv Detail & Related papers (2024-05-24T17:33:10Z) - Secure quantum imaging with decoy state heralded single photons [0.0]
We study quantum secured imaging with the decoy state heralded single photon source (HSPS)
The HSPSs superior performance in low photon number regimes makes it an ideal candidate for integrating quantum key distribution protocols.
arXiv Detail & Related papers (2024-02-18T18:43:05Z) - Practical quantum secure direct communication with squeezed states [55.41644538483948]
We report the first table-top experimental demonstration of a CV-QSDC system and assess its security.
This realization paves the way into future threat-less quantum metropolitan networks, compatible with coexisting advanced wavelength division multiplexing (WDM) systems.
arXiv Detail & Related papers (2023-06-25T19:23:42Z) - Quantum Public Key Distribution using Randomized Glauber States [0.0]
State-of-the-art Quantum Key Distribution (QKD) is based on the uncertainty principle of qubits on quantum measurements.
We propose a novel quantum key distribution mechanism over a pure optical channel using randomized Glauber states.
arXiv Detail & Related papers (2023-02-15T14:12:52Z) - Quantum Key Distribution Using a Quantum Emitter in Hexagonal Boron
Nitride [48.97025221755422]
We demonstrate a room temperature, discrete-variable quantum key distribution system using a bright single photon source in hexagonal-boron nitride.
We have generated keys with one million bits length, and demonstrated a secret key of approximately 70,000 bits, at a quantum bit error rate of 6%.
Our work demonstrates the first proof of concept finite-key BB84 QKD system realised with hBN defects.
arXiv Detail & Related papers (2023-02-13T09:38:51Z) - Security of differential phase shift QKD from relativistic principles [1.114274092885218]
This work presents the first full security proof of DPS QKD against general attacks.
The proof combines techniques from quantum information theory, quantum optics, and relativity.
Our results shed light on the range of applicability of state-of-the-art security proof techniques.
arXiv Detail & Related papers (2023-01-26T19:00:00Z) - Protecting the quantum interference of cat states by phase-space
compression [45.82374977939355]
Cat states with their unique phase-space interference properties are ideal candidates for understanding quantum mechanics.
They are highly susceptible to photon loss, which inevitably diminishes their quantum non-Gaussian features.
Here, we protect these non-Gaussian features by compressing the phase-space distribution of a cat state.
arXiv Detail & Related papers (2022-12-02T16:06:40Z) - Security of quantum key distribution with imperfect phase randomisation [0.0]
We provide a security proof for decoy-state QKD with correlated phases that offers key rates close to the ideal scenario.
Our work paves the way towards high-performance secure QKD with practical laser sources, and may have applications beyond QKD.
arXiv Detail & Related papers (2022-10-15T03:57:56Z) - Efficient room-temperature molecular single-photon sources for quantum
key distribution [51.56795970800138]
Quantum Key Distribution (QKD) allows the distribution of cryptographic keys between multiple users in an information-theoretic secure way.
We introduce and demonstrate a proof-of-concept QKD system exploiting a molecule-based single-photon source operating at room temperature and emitting at 785nm.
arXiv Detail & Related papers (2022-02-25T11:52:10Z) - Quantum key distribution with any two independent and identically
distributed states [0.0]
We provide a security proof of a QKD protocol where the usage of any light source is allowed as long as it emits two independent and identically distributed (i.i.d.) states.
It is remarkable that as long as the light source emits two i.i.d. states, even if we have no prior knowledge of the light source, we can securely employ it in the QKD protocol.
arXiv Detail & Related papers (2020-05-14T11:43:29Z) - Backflash Light as a Security Vulnerability in Quantum Key Distribution
Systems [77.34726150561087]
We review the security vulnerabilities of quantum key distribution (QKD) systems.
We mainly focus on a particular effect known as backflash light, which can be a source of eavesdropping attacks.
arXiv Detail & Related papers (2020-03-23T18:23:12Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.