Go-and-return phase encoded SR QKD and its security consideration
- URL: http://arxiv.org/abs/2106.10082v1
- Date: Fri, 18 Jun 2021 12:09:34 GMT
- Title: Go-and-return phase encoded SR QKD and its security consideration
- Authors: Vadim Rodimin, Andrey Tayduganov, Dmitry Kronberg, Yury Durkin, Alexey
Zharinov and Yury Kurochkin
- Abstract summary: We study the security of coherent-state quantum key distribution with a strong reference pulse.
We propose a two-pass quantum key distribution phase encoding optical scheme with a strong reference pulse.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: In this work, we study the security of coherent-state quantum key
distribution with a strong reference pulse. The consideration is based on a
powerful soft filtering attack and uses realistic parameters of the equipment.
Our model allows us to relate the secure key generation rate and distance with
the energy of signal and reference pulses. We propose a two-pass quantum key
distribution phase encoding optical scheme with a strong reference pulse. This
simple for realization scheme is experimentally tested showing stable
operation. Here we describe the tuning technique and solution for the problem
of weak signal pulse shadowing by a bright reference pulse with the relative
intensity difference of more than 60\,dB between them.
Related papers
- Intensity correlations in decoy-state BB84 quantum key distribution systems [0.0]
We show that higher-order correlations on the intensity of the generated signals can be much higher than that of nearest-neighbour correlations.
We experimentally confirm that the impact of higher-order correlations on the intensity of the generated signals can be much higher than that of nearest-neighbour correlations.
arXiv Detail & Related papers (2024-11-01T16:18:39Z) - Function Approximation for Reinforcement Learning Controller for Energy from Spread Waves [69.9104427437916]
Multi-generator Wave Energy Converters (WEC) must handle multiple simultaneous waves coming from different directions called spread waves.
These complex devices need controllers with multiple objectives of energy capture efficiency, reduction of structural stress to limit maintenance, and proactive protection against high waves.
In this paper, we explore different function approximations for the policy and critic networks in modeling the sequential nature of the system dynamics.
arXiv Detail & Related papers (2024-04-17T02:04:10Z) - Practical quantum secure direct communication with squeezed states [55.41644538483948]
We report the first table-top experimental demonstration of a CV-QSDC system and assess its security.
This realization paves the way into future threat-less quantum metropolitan networks, compatible with coexisting advanced wavelength division multiplexing (WDM) systems.
arXiv Detail & Related papers (2023-06-25T19:23:42Z) - Simplified intensity- and phase-modulated transmitter for modulator-free
decoy-state quantum key distribution [0.0]
Quantum key distribution (QKD) allows secret key exchange between two users with unconditional security.
Currently, the majority of QKD systems demonstrated rely on bulk intensity and phase modulators to generate optical pulses.
We present and experimentally demonstrate a novel optical transmitter design to overcome this disadvantage by generating intensity- and phase-tunable pulses at GHz clock speeds.
arXiv Detail & Related papers (2023-04-02T16:44:25Z) - Pulse-controlled qubit in semiconductor double quantum dots [57.916342809977785]
We present a numerically-optimized multipulse framework for the quantum control of a single-electron charge qubit.
A novel control scheme manipulates the qubit adiabatically, while also retaining high speed and ability to perform a general single-qubit rotation.
arXiv Detail & Related papers (2023-03-08T19:00:02Z) - Security of decoy-state quantum key distribution with correlated
intensity fluctuations [0.0]
Current decoy-state QKD setups operate at GHz repetition rates.
memory effects in the modulators and electronics that control them create correlations between the intensities of the emitted pulses.
This translates into information leakage about the selected intensities.
arXiv Detail & Related papers (2022-06-14T09:05:41Z) - Experimental measurement-device-independent type quantum key
distribution with flawed and correlated sources [14.143874849657317]
Security of quantum key distribution (QKD) is threatened by discrepancies between realistic devices and theoretical assumptions.
Here, we adopt the reference technique to prove security of an efficient four-phase measurement-device-independent QKD using laser pulses against potential source imperfections.
In addition, we demonstrate the feasibility of our protocol through a proof-of-principle experimental implementation and achieve a secure key rate of 253 bps with a 20 dB channel loss.
arXiv Detail & Related papers (2022-04-18T13:44:51Z) - Security of quantum key distribution with intensity correlations [0.0]
In high-speed decoy-state QKD systems, intensity correlations between succeeding pulses leak information about the users' intensity settings.
Here, we develop a technique to incorporate arbitrary intensity correlations to the security analysis of decoy-state QKD.
arXiv Detail & Related papers (2021-05-24T09:13:03Z) - Composably secure data processing for Gaussian-modulated continuous
variable quantum key distribution [58.720142291102135]
Continuous-variable quantum key distribution (QKD) employs the quadratures of a bosonic mode to establish a secret key between two remote parties.
We consider a protocol with homodyne detection in the general setting of composable finite-size security.
In particular, we analyze the high signal-to-noise regime which requires the use of high-rate (non-binary) low-density parity check codes.
arXiv Detail & Related papers (2021-03-30T18:02:55Z) - Round-robin differential phase-time-shifting protocol for quantum key
distribution: theory and experiment [58.03659958248968]
Quantum key distribution (QKD) allows the establishment of common cryptographic keys among distant parties.
Recently, a QKD protocol that circumvents the need for monitoring signal disturbance, has been proposed and demonstrated in initial experiments.
We derive the security proofs of the round-robin differential phase-time-shifting protocol in the collective attack scenario.
Our results show that the RRDPTS protocol can achieve higher secret key rate in comparison with the RRDPS, in the condition of high quantum bit error rate.
arXiv Detail & Related papers (2021-03-15T15:20:09Z) - Assessment of weak-coupling approximations on a driven two-level system
under dissipation [58.720142291102135]
We study a driven qubit through the numerically exact and non-perturbative method known as the Liouville-von equation with dissipation.
We propose a metric that may be used in experiments to map the regime of validity of the Lindblad equation in predicting the steady state of the driven qubit.
arXiv Detail & Related papers (2020-11-11T22:45:57Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.