Security of round-robin differential-phase-shift quantum key
distribution protocol with correlated light sources
- URL: http://arxiv.org/abs/2107.02593v2
- Date: Mon, 6 Feb 2023 00:35:20 GMT
- Title: Security of round-robin differential-phase-shift quantum key
distribution protocol with correlated light sources
- Authors: Akihiro Mizutani, Go Kato
- Abstract summary: We prove that the RRDPS protocol is secure against any source imperfections by establishing a proof with the pulse correlations.
Our numerical simulation based on the proof shows that the long-range pulse correlation does not cause a significant impact on the key rate.
- Score: 2.538209532048867
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Among various quantum key distribution (QKD) protocols, the round-robin
differential-phase-shift (RRDPS) protocol has a unique feature that its
security is guaranteed without monitoring any statistics. Moreover, this
protocol has a remarkable property of being robust against source imperfections
assuming that the emitted pulses are independent. Unfortunately, some
experiments confirmed the violation of the independence due to pulse
correlations, and therefore the lack of a security proof without taking into
account this effect is an obstacle for the security. In this paper, we prove
that the RRDPS protocol is secure against any source imperfections by
establishing a proof with the pulse correlations. Our proof is simple in the
sense that we make only three experimentally simple assumptions for the source.
Our numerical simulation based on the proof shows that the long-range pulse
correlation does not cause a significant impact on the key rate, which reveals
another striking feature of the RRDPS protocol. Our security proof is thus
effective and applicable to wide range of practical sources and paves the way
to realize truly secure QKD in high-speed systems.
Related papers
- Proving security of BB84 under source correlations [0.0]
Device imperfections and memory effects can result in undesired correlations among the states generated by a realistic quantum source.
We present a simple and general method to reduce the security proof of the BB84 protocol with source correlations to one with an almost perfect source.
arXiv Detail & Related papers (2024-02-12T18:14:02Z) - Security of the decoy-state BB84 protocol with imperfect state
preparation [0.0]
We study the security of the efficient decoy-state BB84 QKD protocol in the presence of source flaws.
We investigate the non-Poissonian photon-number statistics due to coherent-state intensity fluctuations and the basis-dependence of the source due to non-ideal polarization state preparation.
arXiv Detail & Related papers (2023-10-02T19:59:57Z) - Practical quantum secure direct communication with squeezed states [55.41644538483948]
We report the first table-top experimental demonstration of a CV-QSDC system and assess its security.
This realization paves the way into future threat-less quantum metropolitan networks, compatible with coexisting advanced wavelength division multiplexing (WDM) systems.
arXiv Detail & Related papers (2023-06-25T19:23:42Z) - Semi-device independent nonlocality certification for near-term quantum
networks [46.37108901286964]
Bell tests are the most rigorous method for verifying entanglement in quantum networks.
If there is any signaling between the parties, then the violation of Bell inequalities can no longer be used.
We propose a semi-device independent protocol that allows us to numerically correct for effects of correlations in experimental probability distributions.
arXiv Detail & Related papers (2023-05-23T14:39:08Z) - Phase-Matching Quantum Key Distribution without Intensity Modulation [25.004151934190965]
We propose a phase-matching quantum key distribution protocol without intensity modulation.
Simulation results show that the transmission distance of our protocol could reach 305 km in telecommunication fiber.
Our protocol provides a promising solution for constructing quantum networks.
arXiv Detail & Related papers (2023-03-21T04:32:01Z) - Experimental measurement-device-independent type quantum key
distribution with flawed and correlated sources [14.143874849657317]
Security of quantum key distribution (QKD) is threatened by discrepancies between realistic devices and theoretical assumptions.
Here, we adopt the reference technique to prove security of an efficient four-phase measurement-device-independent QKD using laser pulses against potential source imperfections.
In addition, we demonstrate the feasibility of our protocol through a proof-of-principle experimental implementation and achieve a secure key rate of 253 bps with a 20 dB channel loss.
arXiv Detail & Related papers (2022-04-18T13:44:51Z) - Device-Independent-Quantum-Randomness-Enhanced Zero-Knowledge Proof [25.758352536166502]
Zero-knowledge proof (ZKP) is a fundamental cryptographic primitive that allows a prover to convince a verifier of the validity of a statement.
As an efficient variant of ZKP, non-interactive zero-knowledge proof (NIZKP) adopting the Fiat-Shamir is essential to a wide spectrum of applications.
arXiv Detail & Related papers (2021-11-12T13:36:43Z) - Round-robin differential phase-time-shifting protocol for quantum key
distribution: theory and experiment [58.03659958248968]
Quantum key distribution (QKD) allows the establishment of common cryptographic keys among distant parties.
Recently, a QKD protocol that circumvents the need for monitoring signal disturbance, has been proposed and demonstrated in initial experiments.
We derive the security proofs of the round-robin differential phase-time-shifting protocol in the collective attack scenario.
Our results show that the RRDPTS protocol can achieve higher secret key rate in comparison with the RRDPS, in the condition of high quantum bit error rate.
arXiv Detail & Related papers (2021-03-15T15:20:09Z) - Practical Quantum Key Distribution Secure Against Side-Channels [0.0]
We introduce a measurement-device-independent (MDI) QKD type of protocol based on the transmission of coherent light.
We prove its security against any possible device imperfection and/or side-channel at the transmitters' side.
The performance of the protocol is comparable to other MDI-QKD type of protocols which disregard the effect of several side-channels.
arXiv Detail & Related papers (2020-07-07T11:56:04Z) - Efficient decoy-states for the reference-frame-independent
measurement-device-independent quantum key distribution [22.452971995801686]
RFI-MDI-QKD eliminates all possible attacks on detector side and necessity of reference-frame alignment in source sides.
The performance of RFI-MDI-QKD is greatly improved in terms of secret key rate and achievable distance when statistical fluctuations are considered.
arXiv Detail & Related papers (2020-02-10T11:52:53Z) - Quantum key distribution with correlated sources [1.7499351967216341]
In theory, quantum key distribution (QKD) offers information-theoretic security.
In practice, however, it does not due to discrepancies between the assumptions used in the security proofs and the behaviour of the real apparatuses.
Here, we close this gap by introducing a simple yet general method to prove the security of QKD with arbitrarily long-range pulse correlations.
arXiv Detail & Related papers (2019-08-22T09:05:17Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.