Security of decoy-state quantum key distribution with correlated
intensity fluctuations
- URL: http://arxiv.org/abs/2206.06700v2
- Date: Tue, 5 Jul 2022 11:32:23 GMT
- Title: Security of decoy-state quantum key distribution with correlated
intensity fluctuations
- Authors: Xoel Sixto, V\'ictor Zapatero, Marcos Curty
- Abstract summary: Current decoy-state QKD setups operate at GHz repetition rates.
memory effects in the modulators and electronics that control them create correlations between the intensities of the emitted pulses.
This translates into information leakage about the selected intensities.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: One of the most prominent techniques to enhance the performance of practical
quantum key distribution (QKD) systems with laser sources is the decoy-state
method. Current decoy-state QKD setups operate at GHz repetition rates, a
regime where memory effects in the modulators and electronics that control them
create correlations between the intensities of the emitted pulses. This
translates into information leakage about the selected intensities, which
cripples a crucial premise of the decoy-state method, thus invalidating the use
of standard security analyses. To overcome this problem, a novel security proof
that exploits the Cauchy-Schwarz constraint has been introduced recently. Its
main drawback is, however, that the achievable key rate is significantly lower
than that of the ideal scenario without intensity correlations. Here, we
improve this security proof technique by combining it with a fine-grained
decoy-state analysis, which can deliver a tight estimation of the relevant
parameters that determine the secret key rate. This results in a notable
performance enhancement, being now the attainable distance double than that of
previous analyses for certain parameter regimes. Also, we show that when the
probability density function of the intensity fluctuations, conditioned on the
current and previous intensity choices, is known, our approach provides a key
rate very similar to the ideal scenario, which highlights the importance of an
accurate experimental characterization of the correlations.
Related papers
- Security Assumptions in Dispersive-Optics QKD [3.249879651054463]
Quantum key distribution (QKD) seeks to provide a method of generating cryptographically-secure keys between remote parties.
We provide examples where a significant gap exists between the Holevo information, and therefore the secret key rate, predicted by two models.
arXiv Detail & Related papers (2024-03-13T23:14:49Z) - How to harness high-dimensional temporal entanglement, using limited
interferometry setups [62.997667081978825]
We develop the first complete analysis of high-dimensional entanglement in the polarization-time-domain.
We show how to efficiently certify relevant density matrix elements and security parameters for Quantum Key Distribution.
We propose a novel setup that can further enhance the noise resistance of free-space quantum communication.
arXiv Detail & Related papers (2023-08-08T17:44:43Z) - Data post-processing for the one-way heterodyne protocol under
composable finite-size security [62.997667081978825]
We study the performance of a practical continuous-variable (CV) quantum key distribution protocol.
We focus on the Gaussian-modulated coherent-state protocol with heterodyne detection in a high signal-to-noise ratio regime.
This allows us to study the performance for practical implementations of the protocol and optimize the parameters connected to the steps above.
arXiv Detail & Related papers (2022-05-20T12:37:09Z) - Experimental measurement-device-independent type quantum key
distribution with flawed and correlated sources [14.143874849657317]
Security of quantum key distribution (QKD) is threatened by discrepancies between realistic devices and theoretical assumptions.
Here, we adopt the reference technique to prove security of an efficient four-phase measurement-device-independent QKD using laser pulses against potential source imperfections.
In addition, we demonstrate the feasibility of our protocol through a proof-of-principle experimental implementation and achieve a secure key rate of 253 bps with a 20 dB channel loss.
arXiv Detail & Related papers (2022-04-18T13:44:51Z) - Partial Identification with Noisy Covariates: A Robust Optimization
Approach [94.10051154390237]
Causal inference from observational datasets often relies on measuring and adjusting for covariates.
We show that this robust optimization approach can extend a wide range of causal adjustment methods to perform partial identification.
Across synthetic and real datasets, we find that this approach provides ATE bounds with a higher coverage probability than existing methods.
arXiv Detail & Related papers (2022-02-22T04:24:26Z) - Go-and-return phase encoded SR QKD and its security consideration [0.0]
We study the security of coherent-state quantum key distribution with a strong reference pulse.
We propose a two-pass quantum key distribution phase encoding optical scheme with a strong reference pulse.
arXiv Detail & Related papers (2021-06-18T12:09:34Z) - Security of quantum key distribution with intensity correlations [0.0]
In high-speed decoy-state QKD systems, intensity correlations between succeeding pulses leak information about the users' intensity settings.
Here, we develop a technique to incorporate arbitrary intensity correlations to the security analysis of decoy-state QKD.
arXiv Detail & Related papers (2021-05-24T09:13:03Z) - Composably secure data processing for Gaussian-modulated continuous
variable quantum key distribution [58.720142291102135]
Continuous-variable quantum key distribution (QKD) employs the quadratures of a bosonic mode to establish a secret key between two remote parties.
We consider a protocol with homodyne detection in the general setting of composable finite-size security.
In particular, we analyze the high signal-to-noise regime which requires the use of high-rate (non-binary) low-density parity check codes.
arXiv Detail & Related papers (2021-03-30T18:02:55Z) - Assessment of weak-coupling approximations on a driven two-level system
under dissipation [58.720142291102135]
We study a driven qubit through the numerically exact and non-perturbative method known as the Liouville-von equation with dissipation.
We propose a metric that may be used in experiments to map the regime of validity of the Lindblad equation in predicting the steady state of the driven qubit.
arXiv Detail & Related papers (2020-11-11T22:45:57Z) - Efficient and robust certification of genuine multipartite entanglement
in noisy quantum error correction circuits [58.720142291102135]
We introduce a conditional witnessing technique to certify genuine multipartite entanglement (GME)
We prove that the detection of entanglement in a linear number of bipartitions by a number of measurements scales linearly, suffices to certify GME.
We apply our method to the noisy readout of stabilizer operators of the distance-three topological color code and its flag-based fault-tolerant version.
arXiv Detail & Related papers (2020-10-06T18:00:07Z) - Tight security bounds for decoy-state quantum key distribution [1.1563829079760959]
The BB84 quantum key distribution (QKD) combined with decoy-state method is currently the most practical protocol.
Here, we provide the rigorous and optimal analytic formula to solve the above tasks.
Our results can be widely applied to deal with statistical fluctuation in quantum cryptography protocols.
arXiv Detail & Related papers (2020-02-16T07:48:25Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.