Security of decoy-state quantum key distribution with correlated
intensity fluctuations
- URL: http://arxiv.org/abs/2206.06700v2
- Date: Tue, 5 Jul 2022 11:32:23 GMT
- Title: Security of decoy-state quantum key distribution with correlated
intensity fluctuations
- Authors: Xoel Sixto, V\'ictor Zapatero, Marcos Curty
- Abstract summary: Current decoy-state QKD setups operate at GHz repetition rates.
memory effects in the modulators and electronics that control them create correlations between the intensities of the emitted pulses.
This translates into information leakage about the selected intensities.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: One of the most prominent techniques to enhance the performance of practical
quantum key distribution (QKD) systems with laser sources is the decoy-state
method. Current decoy-state QKD setups operate at GHz repetition rates, a
regime where memory effects in the modulators and electronics that control them
create correlations between the intensities of the emitted pulses. This
translates into information leakage about the selected intensities, which
cripples a crucial premise of the decoy-state method, thus invalidating the use
of standard security analyses. To overcome this problem, a novel security proof
that exploits the Cauchy-Schwarz constraint has been introduced recently. Its
main drawback is, however, that the achievable key rate is significantly lower
than that of the ideal scenario without intensity correlations. Here, we
improve this security proof technique by combining it with a fine-grained
decoy-state analysis, which can deliver a tight estimation of the relevant
parameters that determine the secret key rate. This results in a notable
performance enhancement, being now the attainable distance double than that of
previous analyses for certain parameter regimes. Also, we show that when the
probability density function of the intensity fluctuations, conditioned on the
current and previous intensity choices, is known, our approach provides a key
rate very similar to the ideal scenario, which highlights the importance of an
accurate experimental characterization of the correlations.
Related papers
- Characterization of Intensity Correlation via Single-photon Detection in Quantum Key Distribution [10.02327858833847]
One of the most significant vulnerabilities in the source unit of quantum key distribution (QKD) is the correlation between quantum states after modulation.
We propose a methodology to characterize the intensity correlation according to the single-photon detection results in the measurement unit.
arXiv Detail & Related papers (2024-08-15T06:13:20Z) - Control landscapes for high-fidelity generation of C-NOT and C-PHASE gates with coherent and environmental driving [41.94295877935867]
We consider the problem of high fidelity generation of two-qubit C-NOT and C-PHASE (with a detailed study of C-Z) gates in presence of the environment.
We study quantum control landscapes which describe the behaviour of the fidelity as a function of the controls.
arXiv Detail & Related papers (2024-05-23T00:04:19Z) - How to harness high-dimensional temporal entanglement, using limited
interferometry setups [62.997667081978825]
We develop the first complete analysis of high-dimensional entanglement in the polarization-time-domain.
We show how to efficiently certify relevant density matrix elements and security parameters for Quantum Key Distribution.
We propose a novel setup that can further enhance the noise resistance of free-space quantum communication.
arXiv Detail & Related papers (2023-08-08T17:44:43Z) - Data post-processing for the one-way heterodyne protocol under
composable finite-size security [62.997667081978825]
We study the performance of a practical continuous-variable (CV) quantum key distribution protocol.
We focus on the Gaussian-modulated coherent-state protocol with heterodyne detection in a high signal-to-noise ratio regime.
This allows us to study the performance for practical implementations of the protocol and optimize the parameters connected to the steps above.
arXiv Detail & Related papers (2022-05-20T12:37:09Z) - Experimental measurement-device-independent type quantum key
distribution with flawed and correlated sources [14.143874849657317]
Security of quantum key distribution (QKD) is threatened by discrepancies between realistic devices and theoretical assumptions.
Here, we adopt the reference technique to prove security of an efficient four-phase measurement-device-independent QKD using laser pulses against potential source imperfections.
In addition, we demonstrate the feasibility of our protocol through a proof-of-principle experimental implementation and achieve a secure key rate of 253 bps with a 20 dB channel loss.
arXiv Detail & Related papers (2022-04-18T13:44:51Z) - Go-and-return phase encoded SR QKD and its security consideration [0.0]
We study the security of coherent-state quantum key distribution with a strong reference pulse.
We propose a two-pass quantum key distribution phase encoding optical scheme with a strong reference pulse.
arXiv Detail & Related papers (2021-06-18T12:09:34Z) - Security of quantum key distribution with intensity correlations [0.0]
In high-speed decoy-state QKD systems, intensity correlations between succeeding pulses leak information about the users' intensity settings.
Here, we develop a technique to incorporate arbitrary intensity correlations to the security analysis of decoy-state QKD.
arXiv Detail & Related papers (2021-05-24T09:13:03Z) - Composably secure data processing for Gaussian-modulated continuous
variable quantum key distribution [58.720142291102135]
Continuous-variable quantum key distribution (QKD) employs the quadratures of a bosonic mode to establish a secret key between two remote parties.
We consider a protocol with homodyne detection in the general setting of composable finite-size security.
In particular, we analyze the high signal-to-noise regime which requires the use of high-rate (non-binary) low-density parity check codes.
arXiv Detail & Related papers (2021-03-30T18:02:55Z) - Assessment of weak-coupling approximations on a driven two-level system
under dissipation [58.720142291102135]
We study a driven qubit through the numerically exact and non-perturbative method known as the Liouville-von equation with dissipation.
We propose a metric that may be used in experiments to map the regime of validity of the Lindblad equation in predicting the steady state of the driven qubit.
arXiv Detail & Related papers (2020-11-11T22:45:57Z) - Efficient and robust certification of genuine multipartite entanglement
in noisy quantum error correction circuits [58.720142291102135]
We introduce a conditional witnessing technique to certify genuine multipartite entanglement (GME)
We prove that the detection of entanglement in a linear number of bipartitions by a number of measurements scales linearly, suffices to certify GME.
We apply our method to the noisy readout of stabilizer operators of the distance-three topological color code and its flag-based fault-tolerant version.
arXiv Detail & Related papers (2020-10-06T18:00:07Z) - Tight security bounds for decoy-state quantum key distribution [1.1563829079760959]
The BB84 quantum key distribution (QKD) combined with decoy-state method is currently the most practical protocol.
Here, we provide the rigorous and optimal analytic formula to solve the above tasks.
Our results can be widely applied to deal with statistical fluctuation in quantum cryptography protocols.
arXiv Detail & Related papers (2020-02-16T07:48:25Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.