Finite-Key Analysis for Coherent One-Way Quantum Key Distribution
- URL: http://arxiv.org/abs/2309.16136v2
- Date: Tue, 9 Jan 2024 05:29:14 GMT
- Title: Finite-Key Analysis for Coherent One-Way Quantum Key Distribution
- Authors: Ming-Yang Li, Xiao-Yu Cao, Yuan-Mei Xie, Hua-Lei Yin, Zeng-Bing Chen
- Abstract summary: Coherent-one-way (COW) quantum key distribution (QKD) is a significant communication protocol that has been implemented experimentally and deployed in practical products.
Existing security analyses of COW-QKD either provide a short transmission distance or lack immunity against coherent attacks in the finite-key regime.
We present a tight finite-key framework for a variant of COW-QKD, which has been proven to extend the secure transmission distance in the case.
- Score: 18.15943439545963
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Coherent-one-way (COW) quantum key distribution (QKD) is a significant
communication protocol that has been implemented experimentally and deployed in
practical products due to its simple equipment requirements. However, existing
security analyses of COW-QKD either provide a short transmission distance or
lack immunity against coherent attacks in the finite-key regime. In this paper,
we present a tight finite-key security analysis within the universally
composable framework for a variant of COW-QKD, which has been proven to extend
the secure transmission distance in the asymptotic case. We combine the quantum
leftover hash lemma and entropic uncertainty relation to derive the key rate
formula. When estimating statistical parameters, we use the recently proposed
Kato's inequality to ensure security against coherent attacks and achieve a
higher key rate. Our paper confirms the security and feasibility of COW-QKD for
practical application and lays the foundation for further theoretical study and
experimental implementation.
Related papers
- Practical hybrid PQC-QKD protocols with enhanced security and performance [44.8840598334124]
We develop hybrid protocols by which QKD and PQC inter-operate within a joint quantum-classical network.
In particular, we consider different hybrid designs that may offer enhanced speed and/or security over the individual performance of either approach.
arXiv Detail & Related papers (2024-11-02T00:02:01Z) - Empirical Risk-aware Machine Learning on Trojan-Horse Detection for Trusted Quantum Key Distribution Networks [31.857236131842843]
Quantum key distribution (QKD) is a cryptographic technique that offers high levels of data security during transmission.
The existence of a gap between theoretical concepts and practical implementation has raised concerns about the trustworthiness of QKD networks.
We propose the implementation of risk-aware machine learning techniques that present risk analysis for Trojan-horse attacks over the time-variant quantum channel.
arXiv Detail & Related papers (2024-01-26T03:36:13Z) - Practical quantum secure direct communication with squeezed states [55.41644538483948]
We report the first table-top experimental demonstration of a CV-QSDC system and assess its security.
This realization paves the way into future threat-less quantum metropolitan networks, compatible with coexisting advanced wavelength division multiplexing (WDM) systems.
arXiv Detail & Related papers (2023-06-25T19:23:42Z) - Security of differential phase shift QKD against explicit individual
attacks [1.9849264945671103]
We characterize the security of the 3 and n-pulse Differential Phase Shift Quantum Key Distribution protocols against individual attacks.
We compare the secure key rates thus obtained with the known lower bounds under a general individual attack.
arXiv Detail & Related papers (2023-05-19T16:56:26Z) - Phase-Matching Quantum Key Distribution without Intensity Modulation [25.004151934190965]
We propose a phase-matching quantum key distribution protocol without intensity modulation.
Simulation results show that the transmission distance of our protocol could reach 305 km in telecommunication fiber.
Our protocol provides a promising solution for constructing quantum networks.
arXiv Detail & Related papers (2023-03-21T04:32:01Z) - Simple and Rigorous Proof Method for the Security of Practical Quantum
Key Distribution in the Single-Qubit Regime Using Mismatched Basis
Measurements [0.2519906683279153]
Quantum key distribution (QKD) protocols aim at allowing two parties to generate a secret shared key.
While many QKD protocols have been proven unconditionally secure in theory, practical security analyses of experimental QKD implementations typically do not take into account all possible loopholes.
We present a simple method of computing secure key rates for any practical implementation of discrete-variable QKD.
arXiv Detail & Related papers (2022-08-29T17:37:58Z) - Improved coherent one-way quantum key distribution for high-loss
channels [0.0]
We present a simple variant of COW-QKD and prove its security in the infinite-key limit.
Remarkably, the resulting key rate of our protocol is comparable with both the existing upper-bound on COW-QKD key rate and the secure key rate of the coherent-state BB84 protocol.
arXiv Detail & Related papers (2022-06-17T00:07:03Z) - Simple security proof of coherent-one-way quantum key distribution [10.146265944582552]
Coherent-one-way quantum key distribution (COW-QKD) has the ability to withstand photon-number-splitting attacks.
Recent studies have shown that the current COW-QKD system is insecure and can only distribute secret keys safely within 20 km of the optical fiber length.
We propose a practical implementation of COW-QKD by adding a two-pulse vacuum state as a new decoy sequence.
arXiv Detail & Related papers (2021-07-20T08:40:16Z) - Round-robin differential phase-time-shifting protocol for quantum key
distribution: theory and experiment [58.03659958248968]
Quantum key distribution (QKD) allows the establishment of common cryptographic keys among distant parties.
Recently, a QKD protocol that circumvents the need for monitoring signal disturbance, has been proposed and demonstrated in initial experiments.
We derive the security proofs of the round-robin differential phase-time-shifting protocol in the collective attack scenario.
Our results show that the RRDPTS protocol can achieve higher secret key rate in comparison with the RRDPS, in the condition of high quantum bit error rate.
arXiv Detail & Related papers (2021-03-15T15:20:09Z) - Recent advances on quantum key distribution overcoming the linear secret
key capacity bound [0.0]
A crucial goal for quantum key distribution (QKD) is to transmit unconditionally secure keys over long distances.
In 2018, the seminal twin-field (TF) QKD protocol was proposed to provide a remarkable solution to overcoming the linear secret key capacity bound.
This article presents an up-to-date survey on recent developments in this area.
arXiv Detail & Related papers (2020-11-26T02:11:53Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.