Experimental Side-Channel-Free Quantum Key Distribution
- URL: http://arxiv.org/abs/2103.06058v1
- Date: Wed, 10 Mar 2021 14:01:36 GMT
- Title: Experimental Side-Channel-Free Quantum Key Distribution
- Authors: Chi Zhang, Xiao-Long Hu, Jiu-Peng Chen, Yang Liu, Weijun Zhang,
Zong-Wen Yu, Hao Li, Lixing You, Zhen Wang, Xiang-Bin Wang, Qiang Zhang,
Jian-Wei Pan
- Abstract summary: In quantum key distribution systems, quantum hackers might steal the secure keys by listening to the side channels in the source.
We achieve a secure key rate of 4.80e-7 per pulse through 50 km fiber spools.
- Score: 19.671665201512166
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Quantum key distribution can provide unconditionally secure key exchange for
remote users in theory. In practice, however, in most quantum key distribution
systems, quantum hackers might steal the secure keys by listening to the side
channels in the source, such as the photon frequency spectrum, emission time,
propagation direction, spatial angular momentum, and so on. It is hard to
prevent such kinds of attacks because side channels may exist in any of the
encoding space whether the designers take care of or not. Here we report an
experimental realization of a side-channel-free quantum key distribution
protocol which is not only measurement-device-independent, but also immune to
all side-channel attacks in the source. We achieve a secure key rate of 4.80e-7
per pulse through 50 km fiber spools.
Related papers
- Experimental Side-Channel-Secure Quantum Key Distribution over 200 km [18.189225381709278]
Quantum key distribution enables two remote parties to share encryption keys with information-theoretic security based on physical laws.<n>Side-channel-secure quantum key distribution (SCS-QKD) has attracted considerable attention due to its immunity to both source and detector side-channel attacks.<n>We experimentally implement the practical SCS-QKD protocol using an imperfect whole-space source.<n>This allows us to extend the transmission distance to 200 km using fiber spools, achieving a secure key rate of 1.29E-7 bits per pulse while accounting for finite-key effects.
arXiv Detail & Related papers (2025-05-06T13:36:24Z) - Unconditionally secure key distribution without quantum channel [0.76146285961466]
Currently, the quantum scheme stands as the only known method for achieving unconditionally secure key distribution.
We propose another key distribution scheme with unconditional security, named probability key distribution, that promises users between any two distances to generate a fixed and high secret key rate.
Non-local entangled states can be generated, identified and measured in the equivalent virtual protocol and can be used to extract secret keys.
arXiv Detail & Related papers (2024-08-24T15:13:14Z) - Decoherence-assisted quantum key distribution [37.69303106863453]
We show that our method reduces the amount of information that an eavesdropper can obtain in the BB84 protocol under the entangling probe attack.
We demonstrate experimentally that Alice and Bob can agree on a scheme to that gives low values of the quantum bit error rate.
arXiv Detail & Related papers (2024-05-30T15:28:07Z) - Deep-Learning-Based Radio-Frequency Side-Channel Attack on Quantum Key
Distribution [0.0]
Quantum key distribution (QKD) protocols are proven secure based on fundamental physical laws.
Side channels, where the encoded quantum state is correlated with properties of other degrees of freedom of the quantum channel, allow an eavesdropper to obtain information unnoticeably.
We here demonstrate a side-channel attack using a deep convolutional neural network to analyze the recorded classical, radio-frequency electromagnetic emissions.
arXiv Detail & Related papers (2023-10-20T18:00:02Z) - Eavesdropper localization for quantum and classical channels via
nonlinear scattering [58.720142291102135]
Quantum key distribution (QKD) offers theoretical security based on the laws of physics.
We present a novel approach to eavesdropper location that can be employed in quantum as well as classical channels.
We demonstrate that our approach outperforms conventional OTDR in the task of localizing an evanescent outcoupling of 1% with cm precision inside standard optical fibers.
arXiv Detail & Related papers (2023-06-25T21:06:27Z) - The ideal wavelength for daylight free-space quantum key distribution [35.310629519009204]
We model a satellite-to-ground quantum channel for different quantum light sources to identify the optimal wavelength for free-space QKD in ambient conditions.
Our results can be applied in roof-to-roof scenarios and are therefore relevant for near-future quantum networks.
arXiv Detail & Related papers (2023-03-03T17:49:31Z) - Quantum Key Distribution Using a Quantum Emitter in Hexagonal Boron
Nitride [48.97025221755422]
We demonstrate a room temperature, discrete-variable quantum key distribution system using a bright single photon source in hexagonal-boron nitride.
We have generated keys with one million bits length, and demonstrated a secret key of approximately 70,000 bits, at a quantum bit error rate of 6%.
Our work demonstrates the first proof of concept finite-key BB84 QKD system realised with hBN defects.
arXiv Detail & Related papers (2023-02-13T09:38:51Z) - Satellite-Based Quantum Key Distribution in the Presence of Bypass
Channels [44.81834231082477]
Security of quantum key distribution under restricted eavesdropping scenarios is addressed.
We find regimes of operation in which the above restrictions on Eve can considerably improve system performance.
Our work opens up new security frameworks for spaceborne quantum communications systems.
arXiv Detail & Related papers (2022-12-09T12:24:40Z) - Side-channel-free quantum key distribution with practical devices [0.9749560288448115]
In the original SCFQKD protocol, an important assumption is that Alice and Bob can produce the perfect vacuum pulses.
Due to the finite extinction ratio of the intensity modulators, the perfect vacuum pulse is impossible in practice.
We make the quantum key distribution side-channel secure with real source device which does not emit perfect vacuum pulses.
arXiv Detail & Related papers (2022-05-17T14:57:38Z) - Efficient room-temperature molecular single-photon sources for quantum
key distribution [51.56795970800138]
Quantum Key Distribution (QKD) allows the distribution of cryptographic keys between multiple users in an information-theoretic secure way.
We introduce and demonstrate a proof-of-concept QKD system exploiting a molecule-based single-photon source operating at room temperature and emitting at 785nm.
arXiv Detail & Related papers (2022-02-25T11:52:10Z) - Noiseless attack and counterfactual security of quantum key distribution [0.0]
We show that the efficiency of counterfactual QKD protocols can be enhanced by including non-counterfactual bits.
We show how this problem can be resolved in a simple way, whereby the non-counterfactual key bits are indicated to be secure.
This method of enhancing the key rate is shown to be applicable to various existing quantum counterfactual key distribution protocols.
arXiv Detail & Related papers (2020-12-09T16:48:43Z) - Discrete-phase-randomized measurement-device-independent quantum key
distribution [1.3706331473063877]
We show that there are loopholes for imperfect phase randomization in measurement-device-independent quantum key distribution.
We propose a discrete-phase-randomized measurement-device-independent quantum key distribution protocol as a solution to close this source-side loophole.
arXiv Detail & Related papers (2020-06-22T03:10:17Z) - Backflash Light as a Security Vulnerability in Quantum Key Distribution
Systems [77.34726150561087]
We review the security vulnerabilities of quantum key distribution (QKD) systems.
We mainly focus on a particular effect known as backflash light, which can be a source of eavesdropping attacks.
arXiv Detail & Related papers (2020-03-23T18:23:12Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.