Security of the decoy-state BB84 protocol with imperfect state
preparation
- URL: http://arxiv.org/abs/2310.01610v2
- Date: Wed, 22 Nov 2023 12:51:18 GMT
- Title: Security of the decoy-state BB84 protocol with imperfect state
preparation
- Authors: Aleksei Reutov, Andrey Tayduganov, Vladimir Mayboroda and Oleg
Fat'yanov
- Abstract summary: We study the security of the efficient decoy-state BB84 QKD protocol in the presence of source flaws.
We investigate the non-Poissonian photon-number statistics due to coherent-state intensity fluctuations and the basis-dependence of the source due to non-ideal polarization state preparation.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: The quantum key distribution (QKD) allows two remote users to share a common
information-theoretic secure secret key. In order to guarantee the security of
a practical QKD implementation, the physical system has to be fully
characterized and all deviations from the ideal protocol due to various
imperfections of realistic devices have to be taken into account in the
security proof. In this work, we study the security of the efficient
decoy-state BB84 QKD protocol in the presence of source flaws, caused by
imperfect intensity and polarization modulation. We investigate the
non-Poissonian photon-number statistics due to coherent-state intensity
fluctuations and the basis-dependence of the source due to non-ideal
polarization state preparation. The analysis is supported by experimental
characterization of intensity and phase distributions.
Related papers
- Orthogonal-state-based Measurement Device Independent Quantum Communication [32.244698777387995]
We propose a new protocol of measurement-device-independent quantum secure direct communication and quantum dialogue employing single basis, i.e., Bell basis as decoy qubits for eavesdropping detection.
Our protocols leverage fundamentally distinct resources to close the security loopholes linked to measurement devices, while also effectively doubling the distance for secure direct message transmission.
arXiv Detail & Related papers (2024-09-30T15:57:17Z) - Empirical Risk-aware Machine Learning on Trojan-Horse Detection for Trusted Quantum Key Distribution Networks [31.857236131842843]
Quantum key distribution (QKD) is a cryptographic technique that offers high levels of data security during transmission.
The existence of a gap between theoretical concepts and practical implementation has raised concerns about the trustworthiness of QKD networks.
We propose the implementation of risk-aware machine learning techniques that present risk analysis for Trojan-horse attacks over the time-variant quantum channel.
arXiv Detail & Related papers (2024-01-26T03:36:13Z) - Mitigating the source-side channel vulnerability by characterization of
photon statistics [1.3458279593461016]
Quantum key distribution (QKD) theoretically offers unconditional security.
Unfortunately, the gap between theory and practice threatens side-channel attacks on practical QKD systems.
We aim to bridge the gap between theory and practice to achieve information-theoretic security.
arXiv Detail & Related papers (2023-08-28T08:37:59Z) - Practical quantum secure direct communication with squeezed states [55.41644538483948]
We report the first table-top experimental demonstration of a CV-QSDC system and assess its security.
This realization paves the way into future threat-less quantum metropolitan networks, compatible with coexisting advanced wavelength division multiplexing (WDM) systems.
arXiv Detail & Related papers (2023-06-25T19:23:42Z) - Semi-device independent nonlocality certification for near-term quantum
networks [46.37108901286964]
Bell tests are the most rigorous method for verifying entanglement in quantum networks.
If there is any signaling between the parties, then the violation of Bell inequalities can no longer be used.
We propose a semi-device independent protocol that allows us to numerically correct for effects of correlations in experimental probability distributions.
arXiv Detail & Related papers (2023-05-23T14:39:08Z) - Robust and efficient verification of graph states in blind
measurement-based quantum computation [52.70359447203418]
Blind quantum computation (BQC) is a secure quantum computation method that protects the privacy of clients.
It is crucial to verify whether the resource graph states are accurately prepared in the adversarial scenario.
Here, we propose a robust and efficient protocol for verifying arbitrary graph states with any prime local dimension.
arXiv Detail & Related papers (2023-05-18T06:24:45Z) - Modified BB84 quantum key distribution protocol robust to source
imperfections [1.53934570513443]
Bennett-Brassard 1984 (BB84) protocol is the most widely implemented quantum key distribution scheme.
We prove the security of the BB84 protocol in the presence of multiple source imperfections.
We show that the addition of a fourth state, while redundant in ideal conditions, significantly improves the estimation of the leaked information.
arXiv Detail & Related papers (2022-10-21T06:23:01Z) - Experimental measurement-device-independent type quantum key
distribution with flawed and correlated sources [14.143874849657317]
Security of quantum key distribution (QKD) is threatened by discrepancies between realistic devices and theoretical assumptions.
Here, we adopt the reference technique to prove security of an efficient four-phase measurement-device-independent QKD using laser pulses against potential source imperfections.
In addition, we demonstrate the feasibility of our protocol through a proof-of-principle experimental implementation and achieve a secure key rate of 253 bps with a 20 dB channel loss.
arXiv Detail & Related papers (2022-04-18T13:44:51Z) - Experimental secure quantum key distribution in presence of
polarization-dependent loss [11.396173835009412]
Quantum key distribution (QKD) is theoretically secure using the principle of quantum mechanics.
We experimentally characterized polarization-dependent loss in realistic state-preparation devices.
We achieved rigorous finite-key security bound over up to 75 km fiber links.
arXiv Detail & Related papers (2022-01-04T01:58:00Z) - Security of round-robin differential-phase-shift quantum key
distribution protocol with correlated light sources [2.538209532048867]
We prove that the RRDPS protocol is secure against any source imperfections by establishing a proof with the pulse correlations.
Our numerical simulation based on the proof shows that the long-range pulse correlation does not cause a significant impact on the key rate.
arXiv Detail & Related papers (2021-07-06T13:08:36Z) - Round-robin differential phase-time-shifting protocol for quantum key
distribution: theory and experiment [58.03659958248968]
Quantum key distribution (QKD) allows the establishment of common cryptographic keys among distant parties.
Recently, a QKD protocol that circumvents the need for monitoring signal disturbance, has been proposed and demonstrated in initial experiments.
We derive the security proofs of the round-robin differential phase-time-shifting protocol in the collective attack scenario.
Our results show that the RRDPTS protocol can achieve higher secret key rate in comparison with the RRDPS, in the condition of high quantum bit error rate.
arXiv Detail & Related papers (2021-03-15T15:20:09Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.