Numerical Security Proof for Decoy-State BB84 and
Measurement-Device-Independent QKD Resistant against Large Basis Misalignment
- URL: http://arxiv.org/abs/2108.10844v2
- Date: Wed, 25 Aug 2021 17:56:15 GMT
- Title: Numerical Security Proof for Decoy-State BB84 and
Measurement-Device-Independent QKD Resistant against Large Basis Misalignment
- Authors: Wenyuan Wang, Norbert L\"utkenhaus
- Abstract summary: We incorporate decoy-state analysis into a well-established numerical framework for key rate calculation.
We apply the numerical framework to decoy-state BB84 and measurement-device-independent (MDI) QKD protocols as examples.
We show that such variations can grant protocols resilience against any unknown and slowly changing rotation along one axis.
- Score: 3.5027291542274357
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: In this work, we incorporate decoy-state analysis into a well-established
numerical framework for key rate calculation, and apply the numerical framework
to decoy-state BB84 and measurement-device-independent (MDI) QKD protocols as
examples. Additionally, we combine with these decoy-state protocols what is
called "fine-grained statistics", which is a variation of existing QKD
protocols that makes use of originally discarded data to get a better key rate.
We show that such variations can grant protocols resilience against any unknown
and slowly changing rotation along one axis, similar to
reference-frame-independent QKD, but without the need for encoding physically
in an additional rotation-invariant basis. Such an analysis can easily be
applied to existing systems, or even data already recorded in previous
experiments, to gain significantly higher key rate when considerable
misalignment is present, extending the maximum distance for BB84 and MDI-QKD
and reducing the need for manual alignment in an experiment.
Related papers
- High-Fidelity Coherent-One-Way QKD Simulation Framework for 6G Networks: Bridging Theory and Reality [105.73011353120471]
Quantum key distribution (QKD) has been emerged as a promising solution for guaranteeing information-theoretic security.
Due to the considerable high-cost of QKD equipment, a lack of QKD communication system design tools is challenging.
This paper introduces a QKD communication system design tool.
arXiv Detail & Related papers (2025-01-21T11:03:59Z) - An Overview of CV-MDI-QKD [32.73124984242397]
Quantum key distribution (QKD) emerges as a robust defense against quantum computer threats.
This paper delves into the integration of these methodologies in the CV-MDI-QKD protocol.
It offers an in-depth exploration of its evolution, primary characteristics, and the latest advancements in both theory and experiment.
arXiv Detail & Related papers (2025-01-16T20:09:23Z) - Loss-tolerant quantum key distribution with detection efficiency mismatch [39.58317527488534]
We establish a security proof for the loss-tolerant P&M QKD protocol that incorporates imperfections in both the source and the detectors.
Specifically, we demonstrate the security of this scheme when the emitted states deviate from the ideal ones.
arXiv Detail & Related papers (2024-12-12T19:01:56Z) - Experimental measurement-device-independent type quantum key
distribution with flawed and correlated sources [14.143874849657317]
Security of quantum key distribution (QKD) is threatened by discrepancies between realistic devices and theoretical assumptions.
Here, we adopt the reference technique to prove security of an efficient four-phase measurement-device-independent QKD using laser pulses against potential source imperfections.
In addition, we demonstrate the feasibility of our protocol through a proof-of-principle experimental implementation and achieve a secure key rate of 253 bps with a 20 dB channel loss.
arXiv Detail & Related papers (2022-04-18T13:44:51Z) - Finite-Key Analysis of Quantum Key Distribution with Characterized
Devices Using Entropy Accumulation [9.316071675613738]
The Entropy Accumulation Theorem (EAT) was introduced to significantly improve the finite-size rates for device-independent quantum information processing tasks.
We present new tools for applying the EAT in the device-dependent setting.
arXiv Detail & Related papers (2022-03-13T03:00:41Z) - Composably secure data processing for Gaussian-modulated continuous
variable quantum key distribution [58.720142291102135]
Continuous-variable quantum key distribution (QKD) employs the quadratures of a bosonic mode to establish a secret key between two remote parties.
We consider a protocol with homodyne detection in the general setting of composable finite-size security.
In particular, we analyze the high signal-to-noise regime which requires the use of high-rate (non-binary) low-density parity check codes.
arXiv Detail & Related papers (2021-03-30T18:02:55Z) - Round-robin differential phase-time-shifting protocol for quantum key
distribution: theory and experiment [58.03659958248968]
Quantum key distribution (QKD) allows the establishment of common cryptographic keys among distant parties.
Recently, a QKD protocol that circumvents the need for monitoring signal disturbance, has been proposed and demonstrated in initial experiments.
We derive the security proofs of the round-robin differential phase-time-shifting protocol in the collective attack scenario.
Our results show that the RRDPTS protocol can achieve higher secret key rate in comparison with the RRDPS, in the condition of high quantum bit error rate.
arXiv Detail & Related papers (2021-03-15T15:20:09Z) - Afterpulsing Effect on the Baseline System Error Rate and on the
Decoy-State Quantum Key Distribution Protocols [0.0]
We develop a theoretical analysis of afterpulsing effect on the decoy-state QKD protocols for multiple detectors.
Results can be used as a guide for every practical decoy-state QKD protocol implementation in real-world deployments.
arXiv Detail & Related papers (2020-10-07T12:06:23Z) - Loss-tolerant quantum key distribution with a twist [0.0]
We provide an extension of the loss-tolerant protocol [Phys. Rev. A 90, 052314 (2014)], a leading proof technique for analyzing the security of QKD, to MDI QKD protocols that employ mixed signal states.
We find that the mixed states can be interpreted as providing Alice and Bob with a virtual shield system they can employ to reduce Eve's knowledge of the secret key.
arXiv Detail & Related papers (2020-07-16T12:37:43Z) - Efficient decoy-states for the reference-frame-independent
measurement-device-independent quantum key distribution [22.452971995801686]
RFI-MDI-QKD eliminates all possible attacks on detector side and necessity of reference-frame alignment in source sides.
The performance of RFI-MDI-QKD is greatly improved in terms of secret key rate and achievable distance when statistical fluctuations are considered.
arXiv Detail & Related papers (2020-02-10T11:52:53Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.