Numerical Security Proof for Decoy-State BB84 and
Measurement-Device-Independent QKD Resistant against Large Basis Misalignment
- URL: http://arxiv.org/abs/2108.10844v2
- Date: Wed, 25 Aug 2021 17:56:15 GMT
- Title: Numerical Security Proof for Decoy-State BB84 and
Measurement-Device-Independent QKD Resistant against Large Basis Misalignment
- Authors: Wenyuan Wang, Norbert L\"utkenhaus
- Abstract summary: We incorporate decoy-state analysis into a well-established numerical framework for key rate calculation.
We apply the numerical framework to decoy-state BB84 and measurement-device-independent (MDI) QKD protocols as examples.
We show that such variations can grant protocols resilience against any unknown and slowly changing rotation along one axis.
- Score: 3.5027291542274357
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: In this work, we incorporate decoy-state analysis into a well-established
numerical framework for key rate calculation, and apply the numerical framework
to decoy-state BB84 and measurement-device-independent (MDI) QKD protocols as
examples. Additionally, we combine with these decoy-state protocols what is
called "fine-grained statistics", which is a variation of existing QKD
protocols that makes use of originally discarded data to get a better key rate.
We show that such variations can grant protocols resilience against any unknown
and slowly changing rotation along one axis, similar to
reference-frame-independent QKD, but without the need for encoding physically
in an additional rotation-invariant basis. Such an analysis can easily be
applied to existing systems, or even data already recorded in previous
experiments, to gain significantly higher key rate when considerable
misalignment is present, extending the maximum distance for BB84 and MDI-QKD
and reducing the need for manual alignment in an experiment.
Related papers
- Bit-flipping Decoder Failure Rate Estimation for (v,w)-regular Codes [84.0257274213152]
We propose a new technique to provide accurate estimates of the DFR of a two-iterations (parallel) bit flipping decoder.
We validate our results, providing comparisons of the modeled and simulated weight of the syndrome, incorrectly-guessed error bit distribution at the end of the first iteration, and two-itcrypteration Decoding Failure Rates (DFR)
arXiv Detail & Related papers (2024-01-30T11:40:24Z) - Empirical Risk-aware Machine Learning on Trojan-Horse Detection for Trusted Quantum Key Distribution Networks [31.857236131842843]
Quantum key distribution (QKD) is a cryptographic technique that offers high levels of data security during transmission.
The existence of a gap between theoretical concepts and practical implementation has raised concerns about the trustworthiness of QKD networks.
We propose the implementation of risk-aware machine learning techniques that present risk analysis for Trojan-horse attacks over the time-variant quantum channel.
arXiv Detail & Related papers (2024-01-26T03:36:13Z) - Single-photon-memory measurement-device-independent quantum secure
direct communication [63.75763893884079]
Quantum secure direct communication (QSDC) uses the quantum channel to transmit information reliably and securely.
In order to eliminate the security loopholes resulting from practical detectors, the measurement-device-independent (MDI) QSDC protocol has been proposed.
We propose a single-photon-memory MDI QSDC protocol (SPMQC) for dispensing with high-performance quantum memory.
arXiv Detail & Related papers (2022-12-12T02:23:57Z) - Experimental measurement-device-independent type quantum key
distribution with flawed and correlated sources [14.143874849657317]
Security of quantum key distribution (QKD) is threatened by discrepancies between realistic devices and theoretical assumptions.
Here, we adopt the reference technique to prove security of an efficient four-phase measurement-device-independent QKD using laser pulses against potential source imperfections.
In addition, we demonstrate the feasibility of our protocol through a proof-of-principle experimental implementation and achieve a secure key rate of 253 bps with a 20 dB channel loss.
arXiv Detail & Related papers (2022-04-18T13:44:51Z) - Finite-Key Analysis of Quantum Key Distribution with Characterized
Devices Using Entropy Accumulation [9.316071675613738]
The Entropy Accumulation Theorem (EAT) was introduced to significantly improve the finite-size rates for device-independent quantum information processing tasks.
We present new tools for applying the EAT in the device-dependent setting.
arXiv Detail & Related papers (2022-03-13T03:00:41Z) - Composably secure data processing for Gaussian-modulated continuous
variable quantum key distribution [58.720142291102135]
Continuous-variable quantum key distribution (QKD) employs the quadratures of a bosonic mode to establish a secret key between two remote parties.
We consider a protocol with homodyne detection in the general setting of composable finite-size security.
In particular, we analyze the high signal-to-noise regime which requires the use of high-rate (non-binary) low-density parity check codes.
arXiv Detail & Related papers (2021-03-30T18:02:55Z) - Round-robin differential phase-time-shifting protocol for quantum key
distribution: theory and experiment [58.03659958248968]
Quantum key distribution (QKD) allows the establishment of common cryptographic keys among distant parties.
Recently, a QKD protocol that circumvents the need for monitoring signal disturbance, has been proposed and demonstrated in initial experiments.
We derive the security proofs of the round-robin differential phase-time-shifting protocol in the collective attack scenario.
Our results show that the RRDPTS protocol can achieve higher secret key rate in comparison with the RRDPS, in the condition of high quantum bit error rate.
arXiv Detail & Related papers (2021-03-15T15:20:09Z) - Afterpulsing Effect on the Baseline System Error Rate and on the
Decoy-State Quantum Key Distribution Protocols [0.0]
We develop a theoretical analysis of afterpulsing effect on the decoy-state QKD protocols for multiple detectors.
Results can be used as a guide for every practical decoy-state QKD protocol implementation in real-world deployments.
arXiv Detail & Related papers (2020-10-07T12:06:23Z) - Loss-tolerant quantum key distribution with a twist [0.0]
We provide an extension of the loss-tolerant protocol [Phys. Rev. A 90, 052314 (2014)], a leading proof technique for analyzing the security of QKD, to MDI QKD protocols that employ mixed signal states.
We find that the mixed states can be interpreted as providing Alice and Bob with a virtual shield system they can employ to reduce Eve's knowledge of the secret key.
arXiv Detail & Related papers (2020-07-16T12:37:43Z) - Efficient decoy-states for the reference-frame-independent
measurement-device-independent quantum key distribution [22.452971995801686]
RFI-MDI-QKD eliminates all possible attacks on detector side and necessity of reference-frame alignment in source sides.
The performance of RFI-MDI-QKD is greatly improved in terms of secret key rate and achievable distance when statistical fluctuations are considered.
arXiv Detail & Related papers (2020-02-10T11:52:53Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.