Security of quantum key distribution with intensity correlations
- URL: http://arxiv.org/abs/2105.11165v2
- Date: Fri, 3 Dec 2021 11:55:01 GMT
- Title: Security of quantum key distribution with intensity correlations
- Authors: V\'ictor Zapatero, \'Alvaro Navarrete, Kiyoshi Tamaki, Marcos Curty
- Abstract summary: In high-speed decoy-state QKD systems, intensity correlations between succeeding pulses leak information about the users' intensity settings.
Here, we develop a technique to incorporate arbitrary intensity correlations to the security analysis of decoy-state QKD.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: The decoy-state method in quantum key distribution (QKD) is a popular
technique to approximately achieve the performance of ideal single-photon
sources by means of simpler and practical laser sources. In high-speed
decoy-state QKD systems, however, intensity correlations between succeeding
pulses leak information about the users' intensity settings, thus invalidating
a key assumption of this approach. Here, we solve this pressing problem by
developing a general technique to incorporate arbitrary intensity correlations
to the security analysis of decoy-state QKD. This technique only requires to
experimentally quantify two main parameters: the correlation range and the
maximum relative deviation between the selected and the actually emitted
intensities. As a side contribution, we provide a non-standard derivation of
the asymptotic secret key rate formula from the non-asymptotic one, in so
revealing a necessary condition for the significance of the former.
Related papers
- Intensity correlations in decoy-state BB84 quantum key distribution systems [0.0]
We show that higher-order correlations on the intensity of the generated signals can be much higher than that of nearest-neighbour correlations.
We experimentally confirm that the impact of higher-order correlations on the intensity of the generated signals can be much higher than that of nearest-neighbour correlations.
arXiv Detail & Related papers (2024-11-01T16:18:39Z) - Characterization of Intensity Correlation via Single-photon Detection in Quantum Key Distribution [10.02327858833847]
One of the most significant vulnerabilities in the source unit of quantum key distribution (QKD) is the correlation between quantum states after modulation.
We propose a methodology to characterize the intensity correlation according to the single-photon detection results in the measurement unit.
arXiv Detail & Related papers (2024-08-15T06:13:20Z) - How to harness high-dimensional temporal entanglement, using limited
interferometry setups [62.997667081978825]
We develop the first complete analysis of high-dimensional entanglement in the polarization-time-domain.
We show how to efficiently certify relevant density matrix elements and security parameters for Quantum Key Distribution.
We propose a novel setup that can further enhance the noise resistance of free-space quantum communication.
arXiv Detail & Related papers (2023-08-08T17:44:43Z) - An Optimization-based Deep Equilibrium Model for Hyperspectral Image
Deconvolution with Convergence Guarantees [71.57324258813675]
We propose a novel methodology for addressing the hyperspectral image deconvolution problem.
A new optimization problem is formulated, leveraging a learnable regularizer in the form of a neural network.
The derived iterative solver is then expressed as a fixed-point calculation problem within the Deep Equilibrium framework.
arXiv Detail & Related papers (2023-06-10T08:25:16Z) - Non-Parametric Learning of Stochastic Differential Equations with Non-asymptotic Fast Rates of Convergence [65.63201894457404]
We propose a novel non-parametric learning paradigm for the identification of drift and diffusion coefficients of non-linear differential equations.
The key idea essentially consists of fitting a RKHS-based approximation of the corresponding Fokker-Planck equation to such observations.
arXiv Detail & Related papers (2023-05-24T20:43:47Z) - Secret key rate bounds for quantum key distribution with non-uniform
phase randomization [0.0]
Decoy-state quantum key distribution (QKD) is undoubtedly the most efficient solution to handle multi-photon signals emitted by laser sources.
It provides the same secret key rate scaling as ideal single-photon sources.
It requires, however, that the phase of each emitted pulse is uniformly random.
arXiv Detail & Related papers (2023-04-07T09:51:13Z) - Security of decoy-state quantum key distribution with correlated
intensity fluctuations [0.0]
Current decoy-state QKD setups operate at GHz repetition rates.
memory effects in the modulators and electronics that control them create correlations between the intensities of the emitted pulses.
This translates into information leakage about the selected intensities.
arXiv Detail & Related papers (2022-06-14T09:05:41Z) - Efficient room-temperature molecular single-photon sources for quantum
key distribution [51.56795970800138]
Quantum Key Distribution (QKD) allows the distribution of cryptographic keys between multiple users in an information-theoretic secure way.
We introduce and demonstrate a proof-of-concept QKD system exploiting a molecule-based single-photon source operating at room temperature and emitting at 785nm.
arXiv Detail & Related papers (2022-02-25T11:52:10Z) - Composably secure data processing for Gaussian-modulated continuous
variable quantum key distribution [58.720142291102135]
Continuous-variable quantum key distribution (QKD) employs the quadratures of a bosonic mode to establish a secret key between two remote parties.
We consider a protocol with homodyne detection in the general setting of composable finite-size security.
In particular, we analyze the high signal-to-noise regime which requires the use of high-rate (non-binary) low-density parity check codes.
arXiv Detail & Related papers (2021-03-30T18:02:55Z) - Fast Objective & Duality Gap Convergence for Non-Convex Strongly-Concave
Min-Max Problems with PL Condition [52.08417569774822]
This paper focuses on methods for solving smooth non-concave min-max problems, which have received increasing attention due to deep learning (e.g., deep AUC)
arXiv Detail & Related papers (2020-06-12T00:32:21Z) - Tight security bounds for decoy-state quantum key distribution [1.1563829079760959]
The BB84 quantum key distribution (QKD) combined with decoy-state method is currently the most practical protocol.
Here, we provide the rigorous and optimal analytic formula to solve the above tasks.
Our results can be widely applied to deal with statistical fluctuation in quantum cryptography protocols.
arXiv Detail & Related papers (2020-02-16T07:48:25Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.