Finite-key security analysis of differential-phase-shift quantum key
distribution
- URL: http://arxiv.org/abs/2301.09844v2
- Date: Wed, 31 May 2023 00:45:54 GMT
- Title: Finite-key security analysis of differential-phase-shift quantum key
distribution
- Authors: Akihiro Mizutani, Yuki Takeuchi, Kiyoshi Tamaki
- Abstract summary: Differential-phase-shift (DPS) quantum key distribution (QKD) is one of the major QKD protocols that can be implemented with a simple setup using a laser source and a passive detection unit.
An information-theoretic security proof of this protocol has been established in [npj Quant Inf. 5, 87] assuming the infinitely large number of emitted pulses.
We show that this obstacle can be overcome by exploiting recently found novel concentration inequality, Kato's inequality.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Differential-phase-shift (DPS) quantum key distribution (QKD) is one of the
major QKD protocols that can be implemented with a simple setup using a laser
source and a passive detection unit. Recently, an information-theoretic
security proof of this protocol has been established in [npj Quant. Inf. 5, 87
(2019)] assuming the infinitely large number of emitted pulses. To implement
the DPS protocol in a real-life world, it is indispensable to analyze the
security with the finite number of emitted pulses. The extension of the
security proof to the finite-size regime requires the accommodation of the
statistical fluctuations to determine the amount of privacy amplification. In
doing so, Azuma's inequality is often employed, but unfortunately we show that
in the case of the DPS protocol, this results in a substantially low key rate.
This low key rate is due to a loose estimation of the sum of probabilities
regarding three-photon emission whose probability of occurrence is very small.
The main contribution of our work is to show that this obstacle can be overcome
by exploiting the recently found novel concentration inequality, Kato's
inequality. As a result, the key rate of the DPS protocol is drastically
improved. For instance, assuming typical experimental parameters, a 3 Mbit
secret key can be generated over 77 km for 8.3 hours, which shows the
feasibility of DPS QKD under a realistic setup.
Related papers
- Differential-phase-shift QKD with practical Mach-Zehnder interferometer [0.0]
We enhance the implementation security of the DPS protocol by incorporating a major imperfection in the measurement unit.
Our numerical simulations demonstrate that even with fluctuations of $pm0.5%$ in the transmittance from the ideal value, the key rate degrades only by a factor of 0.57.
arXiv Detail & Related papers (2024-05-20T03:38:02Z) - Phase-Matching Quantum Key Distribution without Intensity Modulation [25.004151934190965]
We propose a phase-matching quantum key distribution protocol without intensity modulation.
Simulation results show that the transmission distance of our protocol could reach 305 km in telecommunication fiber.
Our protocol provides a promising solution for constructing quantum networks.
arXiv Detail & Related papers (2023-03-21T04:32:01Z) - Quantum Key Distribution Using a Quantum Emitter in Hexagonal Boron
Nitride [48.97025221755422]
We demonstrate a room temperature, discrete-variable quantum key distribution system using a bright single photon source in hexagonal-boron nitride.
We have generated keys with one million bits length, and demonstrated a secret key of approximately 70,000 bits, at a quantum bit error rate of 6%.
Our work demonstrates the first proof of concept finite-key BB84 QKD system realised with hBN defects.
arXiv Detail & Related papers (2023-02-13T09:38:51Z) - Data post-processing for the one-way heterodyne protocol under
composable finite-size security [62.997667081978825]
We study the performance of a practical continuous-variable (CV) quantum key distribution protocol.
We focus on the Gaussian-modulated coherent-state protocol with heterodyne detection in a high signal-to-noise ratio regime.
This allows us to study the performance for practical implementations of the protocol and optimize the parameters connected to the steps above.
arXiv Detail & Related papers (2022-05-20T12:37:09Z) - Device-Independent-Quantum-Randomness-Enhanced Zero-Knowledge Proof [25.758352536166502]
Zero-knowledge proof (ZKP) is a fundamental cryptographic primitive that allows a prover to convince a verifier of the validity of a statement.
As an efficient variant of ZKP, non-interactive zero-knowledge proof (NIZKP) adopting the Fiat-Shamir is essential to a wide spectrum of applications.
arXiv Detail & Related papers (2021-11-12T13:36:43Z) - Security of round-robin differential-phase-shift quantum key
distribution protocol with correlated light sources [2.538209532048867]
We prove that the RRDPS protocol is secure against any source imperfections by establishing a proof with the pulse correlations.
Our numerical simulation based on the proof shows that the long-range pulse correlation does not cause a significant impact on the key rate.
arXiv Detail & Related papers (2021-07-06T13:08:36Z) - Composably secure data processing for Gaussian-modulated continuous
variable quantum key distribution [58.720142291102135]
Continuous-variable quantum key distribution (QKD) employs the quadratures of a bosonic mode to establish a secret key between two remote parties.
We consider a protocol with homodyne detection in the general setting of composable finite-size security.
In particular, we analyze the high signal-to-noise regime which requires the use of high-rate (non-binary) low-density parity check codes.
arXiv Detail & Related papers (2021-03-30T18:02:55Z) - Round-robin differential phase-time-shifting protocol for quantum key
distribution: theory and experiment [58.03659958248968]
Quantum key distribution (QKD) allows the establishment of common cryptographic keys among distant parties.
Recently, a QKD protocol that circumvents the need for monitoring signal disturbance, has been proposed and demonstrated in initial experiments.
We derive the security proofs of the round-robin differential phase-time-shifting protocol in the collective attack scenario.
Our results show that the RRDPTS protocol can achieve higher secret key rate in comparison with the RRDPS, in the condition of high quantum bit error rate.
arXiv Detail & Related papers (2021-03-15T15:20:09Z) - Finite-key analysis of loss-tolerant quantum key distribution based on
random sampling theory [0.0]
We propose an alternative security analysis of the LT protocol against general attacks.
Our security proof provides considerably higher secret-key rates than the previous finite-key analysis.
arXiv Detail & Related papers (2021-01-29T14:32:09Z) - Improved DIQKD protocols with finite-size analysis [2.940150296806761]
We show that positive randomness is achievable up to depolarizing noise values of $9.33%$, exceeding all previously known noise thresholds.
We also develop a modification to random-key-measurement protocols, using a pre-shared seed followed by a "seed recovery" step.
arXiv Detail & Related papers (2020-12-16T03:04:19Z) - Device-Independent Quantum Key Distribution with Random Key Basis [0.0]
Device-independent quantum key distribution (DIQKD) is the art of using untrusted devices to distribute secret keys in an insecure network.
We show that our protocol significantly improves over the original DIQKD protocol, enabling positive keys in the high noise regime for the first time.
arXiv Detail & Related papers (2020-05-06T09:57:47Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.