Finite-Size Security for Discrete-Modulated Continuous-Variable Quantum
Key Distribution Protocols
- URL: http://arxiv.org/abs/2301.08686v2
- Date: Thu, 12 Oct 2023 16:13:01 GMT
- Title: Finite-Size Security for Discrete-Modulated Continuous-Variable Quantum
Key Distribution Protocols
- Authors: Florian Kanitschar, Ian George, Jie Lin, Twesh Upadhyaya and Norbert
L\"utkenhaus
- Abstract summary: We present a composable finite-size security proof against independently and identically distributed collective attacks for a general DM CV-QKD protocol.
We extend and apply a numerical security proof technique to calculate tight lower bounds on the secure key rate.
Results show that our security proof method yields secure finitesize key rates under experimentally viable conditions up to at least 72km transmission distance.
- Score: 4.58733012283457
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Discrete-Modulated (DM) Continuous-Variable Quantum Key Distribution (CV-QKD)
protocols are promising candidates for commercial implementations of quantum
communication networks due to their experimental simplicity. While tight
security analyses in the asymptotic limit exist, proofs in the finite-size
regime are still subject to active research. We present a composable
finite-size security proof against independently and identically distributed
collective attacks for a general DM CV-QKD protocol. We introduce a new energy
testing theorem to bound the effective dimension of Bob's system and rigorously
prove security within Renner's epsilon-security framework and address the issue
of acceptance sets in protocols and their security proof. We want to highlight,
that our method also allows for nonunique acceptance statistics, which is
necessary in practise. Finally, we extend and apply a numerical security proof
technique to calculate tight lower bounds on the secure key rate. To
demonstrate our method, we apply it to a quadrature phase-shift keying
protocol, both for untrusted, ideal and trusted nonideal detectors. The results
show that our security proof method yields secure finite-size key rates under
experimentally viable conditions up to at least 72km transmission distance.
Related papers
- Discrete-modulated continuous-variable quantum key distribution secure against general attacks [0.0]
This work presents a security analysis of DM-CV-QKD against general sequential attacks, including finite-size effects.
Remarkably, our proof considers attacks that are neither independent nor identical, and makes no assumptions about the Hilbert space dimension of the receiver.
arXiv Detail & Related papers (2024-09-04T11:50:18Z) - Continuous-variable quantum digital signatures against coherent attacks [5.777874043843867]
Quantum digital signatures (QDS) guarantee authenticity, integrity and non-repudiation of classical messages based on quantum laws.
We introduce a CV QDS protocol designed to withstand general coherent attacks through the use of a cutting-edge fidelity test function.
Results demonstrate a significant reduction of over 6 orders of magnitude in signature length for a megabit message signing task.
arXiv Detail & Related papers (2024-07-04T03:39:59Z) - Security of hybrid BB84 with heterodyne detection [0.0]
Quantum key distribution (QKD) promises everlasting security based on the laws of physics.
Recent hybrid QKD protocols have been introduced to leverage advantages from both categories.
We provide a rigorous security proof for a protocol introduced by Qi in 2021, where information is encoded in discrete variables.
arXiv Detail & Related papers (2024-02-26T19:00:01Z) - Coding-Based Hybrid Post-Quantum Cryptosystem for Non-Uniform Information [53.85237314348328]
We introduce for non-uniform messages a novel hybrid universal network coding cryptosystem (NU-HUNCC)
We show that NU-HUNCC is information-theoretic individually secured against an eavesdropper with access to any subset of the links.
arXiv Detail & Related papers (2024-02-13T12:12:39Z) - A Survey and Comparative Analysis of Security Properties of CAN Authentication Protocols [92.81385447582882]
The Controller Area Network (CAN) bus leaves in-vehicle communications inherently non-secure.
This paper reviews and compares the 15 most prominent authentication protocols for the CAN bus.
We evaluate protocols based on essential operational criteria that contribute to ease of implementation.
arXiv Detail & Related papers (2024-01-19T14:52:04Z) - Source-Replacement Model for Phase-Matching Quantum Key Distribution [0.40964539027092917]
We study the security of the phase-matching protocol using an intuitive source-replacement model.
As an application of this approach, we introduce a beam-splitting attack scheme.
arXiv Detail & Related papers (2023-09-29T15:00:10Z) - Finite-Key Analysis for Coherent One-Way Quantum Key Distribution [18.15943439545963]
Coherent-one-way (COW) quantum key distribution (QKD) is a significant communication protocol that has been implemented experimentally and deployed in practical products.
Existing security analyses of COW-QKD either provide a short transmission distance or lack immunity against coherent attacks in the finite-key regime.
We present a tight finite-key framework for a variant of COW-QKD, which has been proven to extend the secure transmission distance in the case.
arXiv Detail & Related papers (2023-09-28T03:32:06Z) - Practical quantum secure direct communication with squeezed states [55.41644538483948]
We report the first table-top experimental demonstration of a CV-QSDC system and assess its security.
This realization paves the way into future threat-less quantum metropolitan networks, compatible with coexisting advanced wavelength division multiplexing (WDM) systems.
arXiv Detail & Related papers (2023-06-25T19:23:42Z) - Is Vertical Logistic Regression Privacy-Preserving? A Comprehensive
Privacy Analysis and Beyond [57.10914865054868]
We consider vertical logistic regression (VLR) trained with mini-batch descent gradient.
We provide a comprehensive and rigorous privacy analysis of VLR in a class of open-source Federated Learning frameworks.
arXiv Detail & Related papers (2022-07-19T05:47:30Z) - Data post-processing for the one-way heterodyne protocol under
composable finite-size security [62.997667081978825]
We study the performance of a practical continuous-variable (CV) quantum key distribution protocol.
We focus on the Gaussian-modulated coherent-state protocol with heterodyne detection in a high signal-to-noise ratio regime.
This allows us to study the performance for practical implementations of the protocol and optimize the parameters connected to the steps above.
arXiv Detail & Related papers (2022-05-20T12:37:09Z) - Round-robin differential phase-time-shifting protocol for quantum key
distribution: theory and experiment [58.03659958248968]
Quantum key distribution (QKD) allows the establishment of common cryptographic keys among distant parties.
Recently, a QKD protocol that circumvents the need for monitoring signal disturbance, has been proposed and demonstrated in initial experiments.
We derive the security proofs of the round-robin differential phase-time-shifting protocol in the collective attack scenario.
Our results show that the RRDPTS protocol can achieve higher secret key rate in comparison with the RRDPS, in the condition of high quantum bit error rate.
arXiv Detail & Related papers (2021-03-15T15:20:09Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.