Security of quantum key distribution with intensity correlations
- URL: http://arxiv.org/abs/2105.11165v2
- Date: Fri, 3 Dec 2021 11:55:01 GMT
- Title: Security of quantum key distribution with intensity correlations
- Authors: V\'ictor Zapatero, \'Alvaro Navarrete, Kiyoshi Tamaki, Marcos Curty
- Abstract summary: In high-speed decoy-state QKD systems, intensity correlations between succeeding pulses leak information about the users' intensity settings.
Here, we develop a technique to incorporate arbitrary intensity correlations to the security analysis of decoy-state QKD.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: The decoy-state method in quantum key distribution (QKD) is a popular
technique to approximately achieve the performance of ideal single-photon
sources by means of simpler and practical laser sources. In high-speed
decoy-state QKD systems, however, intensity correlations between succeeding
pulses leak information about the users' intensity settings, thus invalidating
a key assumption of this approach. Here, we solve this pressing problem by
developing a general technique to incorporate arbitrary intensity correlations
to the security analysis of decoy-state QKD. This technique only requires to
experimentally quantify two main parameters: the correlation range and the
maximum relative deviation between the selected and the actually emitted
intensities. As a side contribution, we provide a non-standard derivation of
the asymptotic secret key rate formula from the non-asymptotic one, in so
revealing a necessary condition for the significance of the former.
Related papers
- Quantum key distribution overcoming practical correlated intensity fluctuations [11.207894122345138]
Intensity correlations between neighboring pulses open a prevalent yet often overlooked security loophole in decoy-state quantum key distribution (QKD)
We present and experimentally demonstrate an intensity-correlation-tolerant QKD protocol that mitigates the negative effect that this phenomenon has on the secret key rate.
arXiv Detail & Related papers (2025-01-23T08:56:26Z) - Characterising higher-order phase correlations in gain-switched laser sources with application to quantum key distribution [38.00713966087315]
Multi-photon emissions in laser sources represent a serious threat for the security of quantum key distribution.
We introduce experimental schemes to characterise the phase probability distribution of the emitted pulses.
We demonstrate that an optimisation task over interferometric measures suffices in determining the impact of arbitrary order correlations.
arXiv Detail & Related papers (2024-12-04T22:06:13Z) - Intensity correlations in decoy-state BB84 quantum key distribution systems [0.0]
We show that higher-order correlations on the intensity of the generated signals can be much higher than that of nearest-neighbour correlations.
We experimentally confirm that the impact of higher-order correlations on the intensity of the generated signals can be much higher than that of nearest-neighbour correlations.
arXiv Detail & Related papers (2024-11-01T16:18:39Z) - Characterization of Intensity Correlation via Single-photon Detection in Quantum Key Distribution [10.02327858833847]
One of the most significant vulnerabilities in the source unit of quantum key distribution (QKD) is the correlation between quantum states after modulation.
We propose a methodology to characterize the intensity correlation according to the single-photon detection results in the measurement unit.
arXiv Detail & Related papers (2024-08-15T06:13:20Z) - An Optimization-based Deep Equilibrium Model for Hyperspectral Image
Deconvolution with Convergence Guarantees [71.57324258813675]
We propose a novel methodology for addressing the hyperspectral image deconvolution problem.
A new optimization problem is formulated, leveraging a learnable regularizer in the form of a neural network.
The derived iterative solver is then expressed as a fixed-point calculation problem within the Deep Equilibrium framework.
arXiv Detail & Related papers (2023-06-10T08:25:16Z) - Non-Parametric Learning of Stochastic Differential Equations with Non-asymptotic Fast Rates of Convergence [65.63201894457404]
We propose a novel non-parametric learning paradigm for the identification of drift and diffusion coefficients of non-linear differential equations.
The key idea essentially consists of fitting a RKHS-based approximation of the corresponding Fokker-Planck equation to such observations.
arXiv Detail & Related papers (2023-05-24T20:43:47Z) - Security of decoy-state quantum key distribution with correlated
intensity fluctuations [0.0]
Current decoy-state QKD setups operate at GHz repetition rates.
memory effects in the modulators and electronics that control them create correlations between the intensities of the emitted pulses.
This translates into information leakage about the selected intensities.
arXiv Detail & Related papers (2022-06-14T09:05:41Z) - Distribution Regression with Sliced Wasserstein Kernels [45.916342378789174]
We propose the first OT-based estimator for distribution regression.
We study the theoretical properties of a kernel ridge regression estimator based on such representation.
arXiv Detail & Related papers (2022-02-08T15:21:56Z) - Composably secure data processing for Gaussian-modulated continuous
variable quantum key distribution [58.720142291102135]
Continuous-variable quantum key distribution (QKD) employs the quadratures of a bosonic mode to establish a secret key between two remote parties.
We consider a protocol with homodyne detection in the general setting of composable finite-size security.
In particular, we analyze the high signal-to-noise regime which requires the use of high-rate (non-binary) low-density parity check codes.
arXiv Detail & Related papers (2021-03-30T18:02:55Z) - Fast Objective & Duality Gap Convergence for Non-Convex Strongly-Concave
Min-Max Problems with PL Condition [52.08417569774822]
This paper focuses on methods for solving smooth non-concave min-max problems, which have received increasing attention due to deep learning (e.g., deep AUC)
arXiv Detail & Related papers (2020-06-12T00:32:21Z) - Tight security bounds for decoy-state quantum key distribution [1.1563829079760959]
The BB84 quantum key distribution (QKD) combined with decoy-state method is currently the most practical protocol.
Here, we provide the rigorous and optimal analytic formula to solve the above tasks.
Our results can be widely applied to deal with statistical fluctuation in quantum cryptography protocols.
arXiv Detail & Related papers (2020-02-16T07:48:25Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.