Modified BB84 quantum key distribution protocol robust to source
imperfections
- URL: http://arxiv.org/abs/2210.11754v1
- Date: Fri, 21 Oct 2022 06:23:01 GMT
- Title: Modified BB84 quantum key distribution protocol robust to source
imperfections
- Authors: Margarida Pereira, Guillermo Curr\'as-Lorenzo, \'Alvaro Navarrete,
Akihiro Mizutani, Go Kato, Marcos Curty, Kiyoshi Tamaki
- Abstract summary: Bennett-Brassard 1984 (BB84) protocol is the most widely implemented quantum key distribution scheme.
We prove the security of the BB84 protocol in the presence of multiple source imperfections.
We show that the addition of a fourth state, while redundant in ideal conditions, significantly improves the estimation of the leaked information.
- Score: 1.53934570513443
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: The Bennett-Brassard 1984 (BB84) protocol is the most widely implemented
quantum key distribution (QKD) scheme. However, despite enormous theoretical
and experimental efforts in the past decades, the security of this protocol
with imperfect sources has not yet been rigorously established. In this work,
we address this shortcoming and prove the security of the BB84 protocol in the
presence of multiple source imperfections, including state preparation flaws
and side channels, such as Trojan-horse attacks, mode dependencies and
classical correlations between the emitted pulses. To do so, we consider a
modified BB84 protocol that exploits the basis mismatched events, which are
often discarded in standard security analyses of this scheme; and employ the
reference technique, a powerful mathematical tool to accommodate source
imperfections in the security analysis of QKD. Moreover, we compare the
achievable secret-key rate of the modified BB84 protocol with that of the
three-state loss-tolerant protocol, and show that the addition of a fourth
state, while redundant in ideal conditions, significantly improves the
estimation of the leaked information in the presence of source imperfections,
resulting in a better performance. This work demonstrates the relevance of the
BB84 protocol in guaranteeing implementation security, taking us a step further
towards closing the existing gap between theory and practice of QKD.
Related papers
- Decoherence-assisted quantum key distribution [37.69303106863453]
We show that our method reduces the amount of information that an eavesdropper can obtain in the BB84 protocol under the entangling probe attack.
We demonstrate experimentally that Alice and Bob can agree on a scheme to that gives low values of the quantum bit error rate.
arXiv Detail & Related papers (2024-05-30T15:28:07Z) - Security of hybrid BB84 with heterodyne detection [0.0]
Quantum key distribution (QKD) promises everlasting security based on the laws of physics.
Recent hybrid QKD protocols have been introduced to leverage advantages from both categories.
We provide a rigorous security proof for a protocol introduced by Qi in 2021, where information is encoded in discrete variables.
arXiv Detail & Related papers (2024-02-26T19:00:01Z) - Proving security of BB84 under source correlations [0.0]
Device imperfections and memory effects can result in undesired correlations among the states generated by a realistic quantum source.
We present a simple and general method to reduce the security proof of the BB84 protocol with source correlations to one with an almost perfect source.
arXiv Detail & Related papers (2024-02-12T18:14:02Z) - Comprehensive Analysis of BB84, A Quantum Key Distribution Protocol [0.0]
Quantum Key Distribution (QKD) is a technique that enables secure communication by sharing a secret key.
One of the most well-known QKD protocols is the BB84 protocol, proposed by Charles Bennett and Gilles Brassard in 1984.
arXiv Detail & Related papers (2023-12-09T16:32:54Z) - Security of the decoy-state BB84 protocol with imperfect state
preparation [0.0]
We study the security of the efficient decoy-state BB84 QKD protocol in the presence of source flaws.
We investigate the non-Poissonian photon-number statistics due to coherent-state intensity fluctuations and the basis-dependence of the source due to non-ideal polarization state preparation.
arXiv Detail & Related papers (2023-10-02T19:59:57Z) - Semi-device independent nonlocality certification for near-term quantum
networks [46.37108901286964]
Bell tests are the most rigorous method for verifying entanglement in quantum networks.
If there is any signaling between the parties, then the violation of Bell inequalities can no longer be used.
We propose a semi-device independent protocol that allows us to numerically correct for effects of correlations in experimental probability distributions.
arXiv Detail & Related papers (2023-05-23T14:39:08Z) - Robust and efficient verification of graph states in blind
measurement-based quantum computation [52.70359447203418]
Blind quantum computation (BQC) is a secure quantum computation method that protects the privacy of clients.
It is crucial to verify whether the resource graph states are accurately prepared in the adversarial scenario.
Here, we propose a robust and efficient protocol for verifying arbitrary graph states with any prime local dimension.
arXiv Detail & Related papers (2023-05-18T06:24:45Z) - Exploring the Design of Adaptation Protocols for Improved Generalization
and Machine Learning Safety [33.24980750651318]
We evaluate common adaptation protocols across distributions shifts and machine learning safety metrics.
We find that protocols induce disparate trade-offs that were not apparent from prior evaluation.
Using hardness-promoting augmentations during LP and then FT with augmentations may be particularly effective for trade-off mitigation.
arXiv Detail & Related papers (2022-07-26T02:33:04Z) - Experimental measurement-device-independent type quantum key
distribution with flawed and correlated sources [14.143874849657317]
Security of quantum key distribution (QKD) is threatened by discrepancies between realistic devices and theoretical assumptions.
Here, we adopt the reference technique to prove security of an efficient four-phase measurement-device-independent QKD using laser pulses against potential source imperfections.
In addition, we demonstrate the feasibility of our protocol through a proof-of-principle experimental implementation and achieve a secure key rate of 253 bps with a 20 dB channel loss.
arXiv Detail & Related papers (2022-04-18T13:44:51Z) - Fault-tolerant parity readout on a shuttling-based trapped-ion quantum
computer [64.47265213752996]
We experimentally demonstrate a fault-tolerant weight-4 parity check measurement scheme.
We achieve a flag-conditioned parity measurement single-shot fidelity of 93.2(2)%.
The scheme is an essential building block in a broad class of stabilizer quantum error correction protocols.
arXiv Detail & Related papers (2021-07-13T20:08:04Z) - Round-robin differential phase-time-shifting protocol for quantum key
distribution: theory and experiment [58.03659958248968]
Quantum key distribution (QKD) allows the establishment of common cryptographic keys among distant parties.
Recently, a QKD protocol that circumvents the need for monitoring signal disturbance, has been proposed and demonstrated in initial experiments.
We derive the security proofs of the round-robin differential phase-time-shifting protocol in the collective attack scenario.
Our results show that the RRDPTS protocol can achieve higher secret key rate in comparison with the RRDPS, in the condition of high quantum bit error rate.
arXiv Detail & Related papers (2021-03-15T15:20:09Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.