Countermeasure for negative impact of practical source in
continuous-variable measurement-device-independent quantum key distribution
- URL: http://arxiv.org/abs/2306.15146v1
- Date: Tue, 27 Jun 2023 02:10:15 GMT
- Title: Countermeasure for negative impact of practical source in
continuous-variable measurement-device-independent quantum key distribution
- Authors: Luyu Huang, Xiangyu Wang, Ziyang Chen, Yanhao Sun, Song Yu, Hong Guo
- Abstract summary: We propose a countermeasure for negative impact introduced by the actual source in the CV-MDI QKD system.
Our work enables CV-MDI QKD system not only to resist all attacks against detectors, but also to close the vulnerability caused by the actual source.
- Score: 6.327744953450043
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Continuous-variable measurement-device-independent quantum key distribution
(CV-MDI QKD) can defend all attacks on the measurement devices fundamentally.
Consequently, higher requirements are put forward for the source of CV-MDI QKD
system. However, the imperfections of actual source brings practical security
risks to the CV-MDI QKD system. Therefore, the characteristics of the realistic
source must be controlled in real time to guarantee the practical security of
the CV-MDI QKD system. Here we propose a countermeasure for negative impact
introduced by the actual source in the CV-MDI QKD system based on
one-time-calibration method, not only eliminating the loophole induced from the
relative intensity noise (RIN) which is part of the source noise, but also
modeling the source noise thus improving the performance. In particular, three
cases in terms of whether the preparation noise of the practical sources are
defined or not, where only one of the users or both two users operate
monitoring on their respective source outputs, are investigated. The simulation
results show that the estimated secret key rate without our proposed scheme are
about 10.7 times higher than the realistic rate at 18 km transmission distance
when the variance of RIN is only 0.4. What's worse, the difference becomes
greater and greater with the increase of the variance of RIN. Thus, our
proposed scheme makes sense in further completing the practical security of
CV-MDI QKD system. In other words, our work enables CV-MDI QKD system not only
to resist all attacks against detectors, but also to close the vulnerability
caused by the actual source, thus making the scheme closer to practical
security.
Related papers
- Digital Twin-Assisted Data-Driven Optimization for Reliable Edge Caching in Wireless Networks [60.54852710216738]
We introduce a novel digital twin-assisted optimization framework, called D-REC, to ensure reliable caching in nextG wireless networks.
By incorporating reliability modules into a constrained decision process, D-REC can adaptively adjust actions, rewards, and states to comply with advantageous constraints.
arXiv Detail & Related papers (2024-06-29T02:40:28Z) - Fully Passive Measurement-Device-Independent Quantum Key Distribution [5.6168844664788855]
We show a numerical simulation of the passive MDI-QKD, and we obtain an acceptable key rate while getting much better implementation security.
We have proved that a fully passive protocol is compatible with MDI-QKD and we also proposed a novel idea that could potentially improve the sifting efficiency.
arXiv Detail & Related papers (2023-09-14T12:36:17Z) - Fully passive Measurement Device Independent Quantum Key Distribution [15.545098722427678]
Measurement-device-independent quantum key distribution (MDI-QKD) can resist all attacks on the detection devices.
One possible solution is to use the passive protocol to eliminate the side channels introduced by active modulators at the source.
We propose a fully passive MDI-QKD scheme that can protect the system from both side channels of source modulators and attacks on the measurement devices.
arXiv Detail & Related papers (2023-09-14T10:18:52Z) - Practical quantum secure direct communication with squeezed states [55.41644538483948]
We report the first table-top experimental demonstration of a CV-QSDC system and assess its security.
This realization paves the way into future threat-less quantum metropolitan networks, compatible with coexisting advanced wavelength division multiplexing (WDM) systems.
arXiv Detail & Related papers (2023-06-25T19:23:42Z) - Confidence Attention and Generalization Enhanced Distillation for
Continuous Video Domain Adaptation [62.458968086881555]
Continuous Video Domain Adaptation (CVDA) is a scenario where a source model is required to adapt to a series of individually available changing target domains.
We propose a Confidence-Attentive network with geneRalization enhanced self-knowledge disTillation (CART) to address the challenge in CVDA.
arXiv Detail & Related papers (2023-03-18T16:40:10Z) - Robust Control for Dynamical Systems With Non-Gaussian Noise via Formal
Abstractions [59.605246463200736]
We present a novel controller synthesis method that does not rely on any explicit representation of the noise distributions.
First, we abstract the continuous control system into a finite-state model that captures noise by probabilistic transitions between discrete states.
We use state-of-the-art verification techniques to provide guarantees on the interval Markov decision process and compute a controller for which these guarantees carry over to the original control system.
arXiv Detail & Related papers (2023-01-04T10:40:30Z) - Sampling-Based Robust Control of Autonomous Systems with Non-Gaussian
Noise [59.47042225257565]
We present a novel planning method that does not rely on any explicit representation of the noise distributions.
First, we abstract the continuous system into a discrete-state model that captures noise by probabilistic transitions between states.
We capture these bounds in the transition probability intervals of a so-called interval Markov decision process (iMDP)
arXiv Detail & Related papers (2021-10-25T06:18:55Z) - Composably secure data processing for Gaussian-modulated continuous
variable quantum key distribution [58.720142291102135]
Continuous-variable quantum key distribution (QKD) employs the quadratures of a bosonic mode to establish a secret key between two remote parties.
We consider a protocol with homodyne detection in the general setting of composable finite-size security.
In particular, we analyze the high signal-to-noise regime which requires the use of high-rate (non-binary) low-density parity check codes.
arXiv Detail & Related papers (2021-03-30T18:02:55Z) - Reference-frame-independent measurement-device-independent quantum key
distribution with imperfect sources [2.4331238547907876]
We propose a robust RFI-MDI-QKD protocol which is robust against state preparation flaws.
Our scheme can be realized with only four flawed states, which improves the practical security of RFI-MDI-QKD.
arXiv Detail & Related papers (2021-02-21T16:28:50Z) - Efficient decoy-states for the reference-frame-independent
measurement-device-independent quantum key distribution [22.452971995801686]
RFI-MDI-QKD eliminates all possible attacks on detector side and necessity of reference-frame alignment in source sides.
The performance of RFI-MDI-QKD is greatly improved in terms of secret key rate and achievable distance when statistical fluctuations are considered.
arXiv Detail & Related papers (2020-02-10T11:52:53Z) - Measurement-Device-Independent Quantum Key Distribution with Leaky
Sources [0.0]
Measurement-device-independent quantum key distribution (MDI-QKD) can remove all detection side-channels from quantum communication systems.
We show that MDI-QKD is feasible within a reasonable time frame of signal transmission given that the sources are sufficiently isolated.
arXiv Detail & Related papers (2020-01-21T08:19:21Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.