Security of high-speed quantum key distribution with imperfect sources
- URL: http://arxiv.org/abs/2305.05930v3
- Date: Fri, 02 May 2025 19:05:56 GMT
- Title: Security of high-speed quantum key distribution with imperfect sources
- Authors: Guillermo Currás-Lorenzo, Margarida Pereira, Go Kato, Marcos Curty, Kiyoshi Tamaki,
- Abstract summary: Imperfect encoders compromise the security of quantum key distribution (QKD) systems via modulation flaws, side channels and inter-pulse correlations.<n>Here, we present a finite-key security proof approach against coherent attacks that incorporates general encoding imperfections while achieving significantly better performances and requiring only partial characterization.
- Score: 1.2815904071470707
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Imperfect encoders compromise the security of quantum key distribution (QKD) systems via modulation flaws, side channels and inter-pulse correlations, which invalidate standard security proofs. Existing results addressing such imperfections suffer from critical limitations: they either consider only specific flaws, offer an unreasonably poor performance, or require the protocol to be run very slowly. Here, we present a finite-key security proof approach against coherent attacks that incorporates general encoding imperfections while achieving significantly better performances and requiring only partial characterization.
Related papers
- Secure One-Sided Device-Independent Quantum Key Distribution Under Collective Attacks with Enhanced Robustness [0.0]
We study the security of a quantum key distribution protocol under the one-sided device-independent (1sDI) setting.<n>We show that the protocol tolerates higher quantum bit error rates (QBER) than present DI-QKD protocols.
arXiv Detail & Related papers (2025-07-24T18:47:04Z) - Quantum Skyshield: Quantum Key Distribution and Post-Quantum Authentication for Low-Altitude Wireless Networks in Adverse Skies [36.14072181405793]
Low-altitude wireless networks (LAWNs) have emerged as a critical backbone for supporting the low-altitude economy.<n>To meet growing data demands, some LAWN deployments incorporate free-space optical (FSO) links, which offer exceptional bandwidth and beam directivity.<n>Quantum Skyshield is proposed to enable reliable communication between the base transceiver station (BTS) and LAWN.
arXiv Detail & Related papers (2025-07-20T04:43:33Z) - Security of quantum key distribution with source and detector imperfections through phase-error estimation [0.3749861135832072]
Quantum key distribution (QKD) promises information-theoretic security based on quantum mechanics, but practical implementations face security vulnerabilities due to device imperfections.<n>Recent advances have separately addressed source and detector imperfections in phase-error-estimation based security proof frameworks.<n>We show that existing techniques for BB84-type protocols can be combined to construct a unified security proof that simultaneously accounts for both source and detector imperfections.
arXiv Detail & Related papers (2025-07-04T12:58:12Z) - Application of $α$-order Information Metrics for Secure Communication in Quantum Physical Layer Design [45.41082277680607]
We study the $alpha$-order information-theoretic metrics based on R'enyi entropy.<n>We apply our framework to a practical scenario involving BPSK modulation over a lossy bosonic channel.
arXiv Detail & Related papers (2025-02-07T03:44:11Z) - Loss-tolerant quantum key distribution with detection efficiency mismatch [39.58317527488534]
We establish a security proof for the loss-tolerant P&M QKD protocol that incorporates imperfections in both the source and the detectors.
Specifically, we demonstrate the security of this scheme when the emitted states deviate from the ideal ones.
arXiv Detail & Related papers (2024-12-12T19:01:56Z) - Quantum Key Distribution with Basis-Dependent Detection Probability [0.0]
A common assumption in security proofs is that the detection probability at the receiver, for a given input state, is independent of the measurement basis.
This paper presents a security proof for QKD protocols that does not rely on the above assumption.
We demonstrate, through simulations, that our proof can extract positive key rates for setups vulnerable to large detection probability mismatches.
arXiv Detail & Related papers (2024-11-29T17:35:27Z) - Securing Legacy Communication Networks via Authenticated Cyclic Redundancy Integrity Check [98.34702864029796]
We propose Authenticated Cyclic Redundancy Integrity Check (ACRIC)
ACRIC preserves backward compatibility without requiring additional hardware and is protocol agnostic.
We show that ACRIC offers robust security with minimal transmission overhead ( 1 ms)
arXiv Detail & Related papers (2024-11-21T18:26:05Z) - Quantum key distribution with imperfectly isolated devices [0.32985979395737774]
We introduce a security proof in the presence of information leakage from all state preparation settings for the decoy-state BB84 protocol.
The proof requires minimal experimental characterization, as only a single parameter related to the isolation of the source needs to be determined.
arXiv Detail & Related papers (2024-11-21T08:59:32Z) - Practical hybrid PQC-QKD protocols with enhanced security and performance [44.8840598334124]
We develop hybrid protocols by which QKD and PQC inter-operate within a joint quantum-classical network.
In particular, we consider different hybrid designs that may offer enhanced speed and/or security over the individual performance of either approach.
arXiv Detail & Related papers (2024-11-02T00:02:01Z) - Coding-Based Hybrid Post-Quantum Cryptosystem for Non-Uniform Information [53.85237314348328]
We introduce for non-uniform messages a novel hybrid universal network coding cryptosystem (NU-HUNCC)
We show that NU-HUNCC is information-theoretic individually secured against an eavesdropper with access to any subset of the links.
arXiv Detail & Related papers (2024-02-13T12:12:39Z) - A Survey and Comparative Analysis of Security Properties of CAN Authentication Protocols [92.81385447582882]
The Controller Area Network (CAN) bus leaves in-vehicle communications inherently non-secure.
This paper reviews and compares the 15 most prominent authentication protocols for the CAN bus.
We evaluate protocols based on essential operational criteria that contribute to ease of implementation.
arXiv Detail & Related papers (2024-01-19T14:52:04Z) - Practical quantum secure direct communication with squeezed states [55.41644538483948]
We report the first table-top experimental demonstration of a CV-QSDC system and assess its security.
This realization paves the way into future threat-less quantum metropolitan networks, compatible with coexisting advanced wavelength division multiplexing (WDM) systems.
arXiv Detail & Related papers (2023-06-25T19:23:42Z) - Recursively Feasible Probabilistic Safe Online Learning with Control Barrier Functions [60.26921219698514]
We introduce a model-uncertainty-aware reformulation of CBF-based safety-critical controllers.
We then present the pointwise feasibility conditions of the resulting safety controller.
We use these conditions to devise an event-triggered online data collection strategy.
arXiv Detail & Related papers (2022-08-23T05:02:09Z) - Improved coherent one-way quantum key distribution for high-loss
channels [0.0]
We present a simple variant of COW-QKD and prove its security in the infinite-key limit.
Remarkably, the resulting key rate of our protocol is comparable with both the existing upper-bound on COW-QKD key rate and the secure key rate of the coherent-state BB84 protocol.
arXiv Detail & Related papers (2022-06-17T00:07:03Z) - Upper bounds on key rates in device-independent quantum key distribution
based on convex-combination attacks [1.118478900782898]
We present the convex-combination attack as an efficient, easy-to-use technique for upper-bounding DIQKD key rates.
It allows verifying the accuracy of lower bounds on key rates for state-of-the-art protocols.
arXiv Detail & Related papers (2022-06-13T15:27:48Z) - Prospects for device-independent quantum key distribution [0.0]
Device-independent quantum key distribution (DIQKD) aims to achieve secure key distribution with only minimal assumptions.
We present security proofs for several techniques that help to improve the keyrates and noise tolerance of DIQKD.
arXiv Detail & Related papers (2021-11-23T10:28:30Z) - Pointwise Feasibility of Gaussian Process-based Safety-Critical Control
under Model Uncertainty [77.18483084440182]
Control Barrier Functions (CBFs) and Control Lyapunov Functions (CLFs) are popular tools for enforcing safety and stability of a controlled system, respectively.
We present a Gaussian Process (GP)-based approach to tackle the problem of model uncertainty in safety-critical controllers that use CBFs and CLFs.
arXiv Detail & Related papers (2021-06-13T23:08:49Z) - Secure quantum key distribution with a subset of malicious devices [0.0]
Malicious manipulation of quantum key distribution (QKD) hardware is a serious threat to its security.
One possible approach to re-establish the security of QKD is to use a redundant number of devices.
We introduce an efficient distributed QKD post-processing protocol and prove its security in a variety of corruption models of the possibly malicious devices.
arXiv Detail & Related papers (2020-06-25T12:29:06Z) - Security of quantum key distribution with detection-efficiency mismatch
in the multiphoton case [0.0]
Current security of QKD with detection-efficiency mismatch rely on the assumption of the single-photon light source on the sender side or on the assumption of the single-photon input of the receiver side.
Here we present a rigorous security proof without these assumptions and, thus, solve this important problem and prove the security of QKD with detection-efficiency mismatch against general attacks.
arXiv Detail & Related papers (2020-04-16T17:55:30Z) - Quantum key distribution with correlated sources [1.7499351967216341]
In theory, quantum key distribution (QKD) offers information-theoretic security.
In practice, however, it does not due to discrepancies between the assumptions used in the security proofs and the behaviour of the real apparatuses.
Here, we close this gap by introducing a simple yet general method to prove the security of QKD with arbitrarily long-range pulse correlations.
arXiv Detail & Related papers (2019-08-22T09:05:17Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.