Security of the decoy state method for quantum key distribution
- URL: http://arxiv.org/abs/2101.10128v2
- Date: Sat, 27 Mar 2021 07:30:39 GMT
- Title: Security of the decoy state method for quantum key distribution
- Authors: A.S. Trushechkin, E.O. Kiktenko, D.A. Kronberg, A.K. Fedorov
- Abstract summary: Quantum cryptography or, more precisely, quantum key distribution (QKD) is one of the advanced areas in the field of quantum technologies.
This paper is devoted to the decoy state method, a countermeasure against vulnerabilities caused by the use of coherent states of light for QKD protocols.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Quantum cryptography or, more precisely, quantum key distribution (QKD), is
one of the advanced areas in the field of quantum technologies. The
confidentiality of keys distributed with the use of QKD protocols is guaranteed
by the fundamental laws of quantum mechanics. This paper is devoted to the
decoy state method, a countermeasure against vulnerabilities caused by the use
of coherent states of light for QKD protocols whose security is proved under
the assumption of single-photon states. We give a formal security proof of the
decoy state method against all possible attacks. We compare two widely known
attacks on multiphoton pulses: photon-number splitting and beam splitting.
Finally, we discuss the equivalence of polarization and phase coding.
Related papers
- Practical hybrid PQC-QKD protocols with enhanced security and performance [44.8840598334124]
We develop hybrid protocols by which QKD and PQC inter-operate within a joint quantum-classical network.
In particular, we consider different hybrid designs that may offer enhanced speed and/or security over the individual performance of either approach.
arXiv Detail & Related papers (2024-11-02T00:02:01Z) - Towards efficient and secure quantum-classical communication networks [47.27205216718476]
There are two primary approaches to achieving quantum-resistant security: quantum key distribution (QKD) and post-quantum cryptography (PQC)
We introduce the pros and cons of these protocols and explore how they can be combined to achieve a higher level of security and/or improved performance in key distribution.
We hope our discussion inspires further research into the design of hybrid cryptographic protocols for quantum-classical communication networks.
arXiv Detail & Related papers (2024-11-01T23:36:19Z) - Secure quantum imaging with decoy state heralded single photons [0.0]
We study quantum secured imaging with the decoy state heralded single photon source (HSPS)
The HSPSs superior performance in low photon number regimes makes it an ideal candidate for integrating quantum key distribution protocols.
arXiv Detail & Related papers (2024-02-18T18:43:05Z) - Quantum Public Key Distribution using Randomized Glauber States [0.0]
State-of-the-art Quantum Key Distribution (QKD) is based on the uncertainty principle of qubits on quantum measurements.
We propose a novel quantum key distribution mechanism over a pure optical channel using randomized Glauber states.
arXiv Detail & Related papers (2023-02-15T14:12:52Z) - Quantum Key Distribution Using a Quantum Emitter in Hexagonal Boron
Nitride [48.97025221755422]
We demonstrate a room temperature, discrete-variable quantum key distribution system using a bright single photon source in hexagonal-boron nitride.
We have generated keys with one million bits length, and demonstrated a secret key of approximately 70,000 bits, at a quantum bit error rate of 6%.
Our work demonstrates the first proof of concept finite-key BB84 QKD system realised with hBN defects.
arXiv Detail & Related papers (2023-02-13T09:38:51Z) - Security of differential phase shift QKD from relativistic principles [1.114274092885218]
This work presents the first full security proof of DPS QKD against general attacks.
The proof combines techniques from quantum information theory, quantum optics, and relativity.
Our results shed light on the range of applicability of state-of-the-art security proof techniques.
arXiv Detail & Related papers (2023-01-26T19:00:00Z) - Protecting the quantum interference of cat states by phase-space
compression [45.82374977939355]
Cat states with their unique phase-space interference properties are ideal candidates for understanding quantum mechanics.
They are highly susceptible to photon loss, which inevitably diminishes their quantum non-Gaussian features.
Here, we protect these non-Gaussian features by compressing the phase-space distribution of a cat state.
arXiv Detail & Related papers (2022-12-02T16:06:40Z) - Security of quantum key distribution with imperfect phase randomisation [0.0]
We provide a security proof for decoy-state QKD with correlated phases that offers key rates close to the ideal scenario.
Our work paves the way towards high-performance secure QKD with practical laser sources, and may have applications beyond QKD.
arXiv Detail & Related papers (2022-10-15T03:57:56Z) - Efficient room-temperature molecular single-photon sources for quantum
key distribution [51.56795970800138]
Quantum Key Distribution (QKD) allows the distribution of cryptographic keys between multiple users in an information-theoretic secure way.
We introduce and demonstrate a proof-of-concept QKD system exploiting a molecule-based single-photon source operating at room temperature and emitting at 785nm.
arXiv Detail & Related papers (2022-02-25T11:52:10Z) - Quantum key distribution with any two independent and identically
distributed states [0.0]
We provide a security proof of a QKD protocol where the usage of any light source is allowed as long as it emits two independent and identically distributed (i.i.d.) states.
It is remarkable that as long as the light source emits two i.i.d. states, even if we have no prior knowledge of the light source, we can securely employ it in the QKD protocol.
arXiv Detail & Related papers (2020-05-14T11:43:29Z) - Backflash Light as a Security Vulnerability in Quantum Key Distribution
Systems [77.34726150561087]
We review the security vulnerabilities of quantum key distribution (QKD) systems.
We mainly focus on a particular effect known as backflash light, which can be a source of eavesdropping attacks.
arXiv Detail & Related papers (2020-03-23T18:23:12Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.