A security framework for quantum key distribution implementations
- URL: http://arxiv.org/abs/2305.05930v2
- Date: Tue, 23 Jul 2024 12:37:15 GMT
- Title: A security framework for quantum key distribution implementations
- Authors: Guillermo CurrĂ¡s-Lorenzo, Margarida Pereira, Go Kato, Marcos Curty, Kiyoshi Tamaki,
- Abstract summary: We present a security proof in the finite-key regime against coherent attacks.
Our proof requires minimal state characterization, which facilitates its application to real-life implementations.
- Score: 1.2815904071470707
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Quantum key distribution (QKD) can theoretically achieve the Holy Grail of cryptography, information-theoretic security against eavesdropping. However, in practice, discrepancies between the mathematical models assumed in security proofs and the actual functioning of the devices used in implementations prevent it from reaching this goal. Device-independent QKD is currently not a satisfactory solution to this problem, as its performance is extremely poor and most of its security proofs assume that the user devices leak absolutely no information to the outside. On the other hand, measurement-device-independent (MDI) QKD can guarantee security with arbitrarily flawed receivers while achieving high performance, and the remaining challenge is ensuring its security in the presence of source imperfections. So far, all efforts in this regard have come at a price; some proofs are suitable only for particular source imperfections, while others severely compromise the system's performance, i.e., its communication speed and distance. Here, we overcome these crucial problems by presenting a security proof in the finite-key regime against coherent attacks that can incorporate general encoding imperfections and side channels while achieving much higher performances than previous approaches. Moreover, our proof requires minimal state characterization, which facilitates its application to real-life implementations.
Related papers
- Securing Legacy Communication Networks via Authenticated Cyclic Redundancy Integrity Check [98.34702864029796]
We propose Authenticated Cyclic Redundancy Integrity Check (ACRIC)
ACRIC preserves backward compatibility without requiring additional hardware and is protocol agnostic.
We show that ACRIC offers robust security with minimal transmission overhead ( 1 ms)
arXiv Detail & Related papers (2024-11-21T18:26:05Z) - Quantum key distribution with imperfectly isolated devices [0.32985979395737774]
We introduce a security proof in the presence of information leakage from all state preparation settings for the decoy-state BB84 protocol.
The proof requires minimal experimental characterization, as only a single parameter related to the isolation of the source needs to be determined.
arXiv Detail & Related papers (2024-11-21T08:59:32Z) - Coding-Based Hybrid Post-Quantum Cryptosystem for Non-Uniform Information [53.85237314348328]
We introduce for non-uniform messages a novel hybrid universal network coding cryptosystem (NU-HUNCC)
We show that NU-HUNCC is information-theoretic individually secured against an eavesdropper with access to any subset of the links.
arXiv Detail & Related papers (2024-02-13T12:12:39Z) - A Survey and Comparative Analysis of Security Properties of CAN Authentication Protocols [92.81385447582882]
The Controller Area Network (CAN) bus leaves in-vehicle communications inherently non-secure.
This paper reviews and compares the 15 most prominent authentication protocols for the CAN bus.
We evaluate protocols based on essential operational criteria that contribute to ease of implementation.
arXiv Detail & Related papers (2024-01-19T14:52:04Z) - Practical quantum secure direct communication with squeezed states [55.41644538483948]
We report the first table-top experimental demonstration of a CV-QSDC system and assess its security.
This realization paves the way into future threat-less quantum metropolitan networks, compatible with coexisting advanced wavelength division multiplexing (WDM) systems.
arXiv Detail & Related papers (2023-06-25T19:23:42Z) - Recursively Feasible Probabilistic Safe Online Learning with Control Barrier Functions [60.26921219698514]
We introduce a model-uncertainty-aware reformulation of CBF-based safety-critical controllers.
We then present the pointwise feasibility conditions of the resulting safety controller.
We use these conditions to devise an event-triggered online data collection strategy.
arXiv Detail & Related papers (2022-08-23T05:02:09Z) - Prospects for device-independent quantum key distribution [0.0]
Device-independent quantum key distribution (DIQKD) aims to achieve secure key distribution with only minimal assumptions.
We present security proofs for several techniques that help to improve the keyrates and noise tolerance of DIQKD.
arXiv Detail & Related papers (2021-11-23T10:28:30Z) - Pointwise Feasibility of Gaussian Process-based Safety-Critical Control
under Model Uncertainty [77.18483084440182]
Control Barrier Functions (CBFs) and Control Lyapunov Functions (CLFs) are popular tools for enforcing safety and stability of a controlled system, respectively.
We present a Gaussian Process (GP)-based approach to tackle the problem of model uncertainty in safety-critical controllers that use CBFs and CLFs.
arXiv Detail & Related papers (2021-06-13T23:08:49Z) - Secure quantum key distribution with a subset of malicious devices [0.0]
Malicious manipulation of quantum key distribution (QKD) hardware is a serious threat to its security.
One possible approach to re-establish the security of QKD is to use a redundant number of devices.
We introduce an efficient distributed QKD post-processing protocol and prove its security in a variety of corruption models of the possibly malicious devices.
arXiv Detail & Related papers (2020-06-25T12:29:06Z) - Security of quantum key distribution with detection-efficiency mismatch
in the multiphoton case [0.0]
Current security of QKD with detection-efficiency mismatch rely on the assumption of the single-photon light source on the sender side or on the assumption of the single-photon input of the receiver side.
Here we present a rigorous security proof without these assumptions and, thus, solve this important problem and prove the security of QKD with detection-efficiency mismatch against general attacks.
arXiv Detail & Related papers (2020-04-16T17:55:30Z) - Quantum key distribution with correlated sources [1.7499351967216341]
In theory, quantum key distribution (QKD) offers information-theoretic security.
In practice, however, it does not due to discrepancies between the assumptions used in the security proofs and the behaviour of the real apparatuses.
Here, we close this gap by introducing a simple yet general method to prove the security of QKD with arbitrarily long-range pulse correlations.
arXiv Detail & Related papers (2019-08-22T09:05:17Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.