Security bounds for decoy-state QKD with arbitrary photon-number
statistics
- URL: http://arxiv.org/abs/2109.13830v1
- Date: Tue, 28 Sep 2021 15:59:49 GMT
- Title: Security bounds for decoy-state QKD with arbitrary photon-number
statistics
- Authors: Giulio Foletto, Francesco Picciariello, Costantino Agnesi, Paolo
Villoresi, Giuseppe Vallone
- Abstract summary: The decoy-state method is a standard enhancement to quantum key distribution (QKD) protocols.
We provide security bounds for decoy-state QKD using a source with an arbitrary photon emission statistic.
We numerically evaluate the performance of the bounds, comparing three realistic statistical distributions.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: The decoy-state method is a standard enhancement to quantum key distribution
(QKD) protocols that has enabled countless QKD experiments with inexpensive
light sources. However, new technological advancements might require further
theoretical study of this technique. In particular, the decoy-state method is
typically described under the assumption of a Poisson statistical distribution
for the number of photons in each QKD pulse. This is a practical choice,
because prepare-and-measure QKD is often implemented with attenuated lasers,
which produce exactly this distribution. However, sources that do not meet this
assumption are not guaranteed to be compatible with decoy states. In this work,
we provide security bounds for decoy-state QKD using a source with an arbitrary
photon emission statistic. We consider both the asymptotic limit of infinite
key and the finite-size scenario, and evaluate two common decoy-state schemes:
the vacuum+weak and one-decoy protocols. We numerically evaluate the
performance of the bounds, comparing three realistic statistical distributions
(Poisson, thermal, binomial), showing that they are all viable options for QKD.
Related papers
- Mitigating the source-side channel vulnerability by characterization of
photon statistics [1.3458279593461016]
Quantum key distribution (QKD) theoretically offers unconditional security.
Unfortunately, the gap between theory and practice threatens side-channel attacks on practical QKD systems.
We aim to bridge the gap between theory and practice to achieve information-theoretic security.
arXiv Detail & Related papers (2023-08-28T08:37:59Z) - Phase-Matching Quantum Key Distribution without Intensity Modulation [25.004151934190965]
We propose a phase-matching quantum key distribution protocol without intensity modulation.
Simulation results show that the transmission distance of our protocol could reach 305 km in telecommunication fiber.
Our protocol provides a promising solution for constructing quantum networks.
arXiv Detail & Related papers (2023-03-21T04:32:01Z) - Quantum Key Distribution Using a Quantum Emitter in Hexagonal Boron
Nitride [48.97025221755422]
We demonstrate a room temperature, discrete-variable quantum key distribution system using a bright single photon source in hexagonal-boron nitride.
We have generated keys with one million bits length, and demonstrated a secret key of approximately 70,000 bits, at a quantum bit error rate of 6%.
Our work demonstrates the first proof of concept finite-key BB84 QKD system realised with hBN defects.
arXiv Detail & Related papers (2023-02-13T09:38:51Z) - Efficient room-temperature molecular single-photon sources for quantum
key distribution [51.56795970800138]
Quantum Key Distribution (QKD) allows the distribution of cryptographic keys between multiple users in an information-theoretic secure way.
We introduce and demonstrate a proof-of-concept QKD system exploiting a molecule-based single-photon source operating at room temperature and emitting at 785nm.
arXiv Detail & Related papers (2022-02-25T11:52:10Z) - Finite-key analysis for quantum key distribution with discrete phase
randomization [21.561489948824274]
We develop a technique based on conjugate measurement and quantum state distinguishment to ana-lyze the security.
Our result shows that TF-QKD with reasonable number of discrete random phases, e.g. 8 phases from 0, pi/4, pi/2,..., 7pi/4, can achieve satisfactory performance.
arXiv Detail & Related papers (2022-01-09T15:45:44Z) - Security of the decoy state method for quantum key distribution [0.0]
Quantum cryptography or, more precisely, quantum key distribution (QKD) is one of the advanced areas in the field of quantum technologies.
This paper is devoted to the decoy state method, a countermeasure against vulnerabilities caused by the use of coherent states of light for QKD protocols.
arXiv Detail & Related papers (2021-01-25T14:33:04Z) - Twin-field quantum key distribution with passive-decoy state [22.26373392802507]
We propose passive-decoy based TF-QKD, in which we combine TF-QKD with the passive-decoy method.
We present a simulation comparing the key generation rate with that in active-decoy, the result shows our scheme performs as good as active decoy TF-QKD.
arXiv Detail & Related papers (2020-11-15T04:02:48Z) - Finite-key analysis for twin-field quantum key distribution based on
generalized operator dominance condition [23.004519226886444]
Quantum key distribution (QKD) can help two distant peers to share secret key bits, whose security is guaranteed by the law of physics.
Recently, twin-field (TF) QKD has been proposed and intensively studied, since it can beat the rate-distance limit.
We propose an improved finite-key analysis of TF-QKD through new operator dominance condition.
arXiv Detail & Related papers (2020-07-17T09:41:06Z) - Upper security bounds for coherent-one-way quantum key distribution [0.0]
Coherent-one-way (COW) QKD has been introduced as a promising solution to overcome this limitation.
Thanks to its experimental simplicity, the COW protocol is already used in commercial applications.
We derive simple upper security bounds on its secret key rate, which demonstrate that it scales at most quadratically with the system's transmittance.
arXiv Detail & Related papers (2020-06-30T15:20:08Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.