Improved security bounds against the Trojan-Horse attack in decoy-state
quantum key distribution
- URL: http://arxiv.org/abs/2312.15399v1
- Date: Sun, 24 Dec 2023 04:07:34 GMT
- Title: Improved security bounds against the Trojan-Horse attack in decoy-state
quantum key distribution
- Authors: Zijian Li, Bingbing Zheng, Chengxian Zhang, Zhenrong Zhang, Hong-Bo
Xie, Kejin Wei
- Abstract summary: In a quantum Trojan-horse attack (THA), eavesdroppers learn encoded information by injecting bright light into encoded or decoded devices of quantum key distribution (QKD) systems.
Here, we present a numerical method for achieving improved security bound for a decoy-state QKD system under THAs.
- Score: 9.817648279997027
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: In a quantum Trojan-horse attack (THA), eavesdroppers learn encoded
information by injecting bright light into encoded or decoded devices of
quantum key distribution (QKD) systems. These attacks severely compromise the
security of non-isolated systems. Thus, analytical security bound was derived
in previous studies. However, these studies achieved poor performance unless
the devices were strongly isolated. Here, we present a numerical method for
achieving improved security bound for a decoy-state QKD system under THAs. The
developed method takes advantage of the well-established numerical framework
and significantly outperforms previous analytical bounds regarding the
achievable final key and secure transmitted distance. The results provide a new
tool for investigating the efficient security bounds of THA in practical
decoy-state QKD systems. This study constitutes an important step toward
securing QKD with real-life components.
Related papers
- High-Fidelity Coherent-One-Way QKD Simulation Framework for 6G Networks: Bridging Theory and Reality [105.73011353120471]
Quantum key distribution (QKD) has been emerged as a promising solution for guaranteeing information-theoretic security.
Due to the considerable high-cost of QKD equipment, a lack of QKD communication system design tools is challenging.
This paper introduces a QKD communication system design tool.
arXiv Detail & Related papers (2025-01-21T11:03:59Z) - Loss-tolerant quantum key distribution with detection efficiency mismatch [39.58317527488534]
We establish a security proof for the loss-tolerant P&M QKD protocol that incorporates imperfections in both the source and the detectors.
Specifically, we demonstrate the security of this scheme when the emitted states deviate from the ideal ones.
arXiv Detail & Related papers (2024-12-12T19:01:56Z) - Practical hybrid PQC-QKD protocols with enhanced security and performance [44.8840598334124]
We develop hybrid protocols by which QKD and PQC inter-operate within a joint quantum-classical network.
In particular, we consider different hybrid designs that may offer enhanced speed and/or security over the individual performance of either approach.
arXiv Detail & Related papers (2024-11-02T00:02:01Z) - Quantum-Secured Data Centre Interconnect in a field environment [38.4938584033229]
Quantum key distribution (QKD) is an established quantum technology at a high readiness level.
In this article, we present the successful implementation of a QKD field trial within a commercial data centre environment.
The achieved average secret key rate of 2.392 kbps and an average quantum bit error rate of less than 2% demonstrate the commercial feasibility of QKD in real-world scenarios.
arXiv Detail & Related papers (2024-10-14T08:05:25Z) - Finite-Key Analysis for Coherent One-Way Quantum Key Distribution [18.15943439545963]
Coherent-one-way (COW) quantum key distribution (QKD) is a significant communication protocol that has been implemented experimentally and deployed in practical products.
Existing security analyses of COW-QKD either provide a short transmission distance or lack immunity against coherent attacks in the finite-key regime.
We present a tight finite-key framework for a variant of COW-QKD, which has been proven to extend the secure transmission distance in the case.
arXiv Detail & Related papers (2023-09-28T03:32:06Z) - Practical quantum secure direct communication with squeezed states [55.41644538483948]
We report the first table-top experimental demonstration of a CV-QSDC system and assess its security.
This realization paves the way into future threat-less quantum metropolitan networks, compatible with coexisting advanced wavelength division multiplexing (WDM) systems.
arXiv Detail & Related papers (2023-06-25T19:23:42Z) - Experimental study of secure quantum key distribution with source and
detection imperfections [4.193177700786187]
The quantum key distribution (QKD) is a promising solution for future secure information and communication technology.
This study reports a decoy-state BB84 QKD experiment that considers both source and detection imperfections.
arXiv Detail & Related papers (2022-08-08T03:31:20Z) - Improved coherent one-way quantum key distribution for high-loss
channels [0.0]
We present a simple variant of COW-QKD and prove its security in the infinite-key limit.
Remarkably, the resulting key rate of our protocol is comparable with both the existing upper-bound on COW-QKD key rate and the secure key rate of the coherent-state BB84 protocol.
arXiv Detail & Related papers (2022-06-17T00:07:03Z) - Improved Finite-Key Security Analysis of Quantum Key Distribution
Against Trojan-Horse Attacks [0.0]
Most security proofs of quantum key distribution (QKD) disregard the effect of information leakage from the users' devices.
In a Trojan-horse attack, the eavesdropper injects strong light into the QKD apparatuses, and then analyzes the back-reflected light to learn information about their internal setting choices.
We derive finite-key security bounds for decoy-state-based QKD schemes in the presence of THAs, which significantly outperform previous analyses.
arXiv Detail & Related papers (2022-02-14T11:35:26Z) - Backflash Light as a Security Vulnerability in Quantum Key Distribution
Systems [77.34726150561087]
We review the security vulnerabilities of quantum key distribution (QKD) systems.
We mainly focus on a particular effect known as backflash light, which can be a source of eavesdropping attacks.
arXiv Detail & Related papers (2020-03-23T18:23:12Z) - Quantum key distribution with correlated sources [1.7499351967216341]
In theory, quantum key distribution (QKD) offers information-theoretic security.
In practice, however, it does not due to discrepancies between the assumptions used in the security proofs and the behaviour of the real apparatuses.
Here, we close this gap by introducing a simple yet general method to prove the security of QKD with arbitrarily long-range pulse correlations.
arXiv Detail & Related papers (2019-08-22T09:05:17Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.