Composable Continuous-Variable Multi-User QKD with Discrete Modulation: Theory and Implementation
- URL: http://arxiv.org/abs/2406.14610v2
- Date: Fri, 12 Sep 2025 07:30:00 GMT
- Title: Composable Continuous-Variable Multi-User QKD with Discrete Modulation: Theory and Implementation
- Authors: Florian Kanitschar, Adnan A. E. Hajomer, Michael Hentschel, Tobias Gehring, Christoph Pacher,
- Abstract summary: We generalize a well-established discrete-modulated continuous-variable (CV) QKD protocol from the point-to-point to the point-to-multipoint setting.<n> Experimentally, we validate the protocol in a passive optical network with 10 km access links, achieving a composable secure key rate of $2.185 times 10-3$ bits per symbol.
- Score: 2.7163502859846873
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Establishing scalable, secure quantum networks requires advancing beyond conventional point-to-point quantum key distribution (QKD) protocols toward point-to-multipoint QKD protocols. Here, we generalize a well-established discrete-modulated continuous-variable (CV) QKD protocol from the point-to-point to the point-to-multipoint setting. We present a comprehensive security analysis across four trust scenarios and derive secret key rates for both loss-only and noisy channels, in the asymptotic and composable finite-size regimes. Experimentally, we validate the protocol in a passive optical network with 10 km access links, achieving a composable secure key rate of $2.185 \times 10^{-3}$ bits per symbol (0.273 Mbit/s) against independent and identically distributed collective attacks. Our results demonstrate that discrete-modulated CV-QKD can support access networks with multiple users while relying solely on cost-efficient, off-the-shelf telecommunication components, paving the way toward practical, scalable, and secure quantum networks.
Related papers
- Performance Analysis of One- and Two-way DV-QKD with MIMO FSO Communication Systems [33.44770581515422]
Two legitimate users attempt to exchange secret keys over free-space optical channels.<n>Novel frameworks for the use of the one- and two-way discrete-variable quantum key distribution protocols are presented.
arXiv Detail & Related papers (2025-11-07T11:42:25Z) - Twin-Field Quantum Key Distribution: Protocols, Security, and Open Problems [0.0]
Twin-Field Quantum Key Distribution (TF-QKD) has emerged as a potential protocol for long distance secure communication.<n>By having two parties transmit phase encoded weak coherent pulses to an untrusted central node, the TF-QKD exploits single-photon interference to achieve secret key rates scaling as square-root of channel length.<n>This survey provides a comprehensive survey of TF-QKD, covering the original protocol, its fundamental principles, and key-rate derivation.
arXiv Detail & Related papers (2025-10-30T10:14:09Z) - On the Implementation Security of Twin-Field Quantum Key Distribution using Optical Injection Locking [32.505127447635864]
Twin-Field Quantum Key Distribution (TF-QKD) has emerged as a leading quantum communication protocol.<n>We analyse potential side-channels in OIL-based TF-QKD that can be introduced through the various optical degrees of freedom of the externally injected reference laser.<n>We propose straightforward and highly effective countermeasures including high-speed photodiodes for real-time power monitoring and targeted spectral filtering to detect and suppress out-of-band signals.
arXiv Detail & Related papers (2025-08-29T16:38:18Z) - Hybrid Implementation for Untrusted-node-based Quantum Key Distribution Network [16.242325482656927]
Quantum key distribution (QKD) serves as a cornerstone of secure quantum communication.<n>We present a hybrid system that seamlessly integrates TF-QKD and MDI-QKD into one untrusted-node-based architecture.<n> Experiments demonstrate secure finite-size key rates for sending-or-not-sending QKD and MDI-QKD over fiber distances of 150 to 431 km.
arXiv Detail & Related papers (2025-03-07T02:27:41Z) - Secure Multi-Party Biometric Verification using QKD assisted Quantum Oblivious Transfer [34.46964288961048]
We present a practical implementation of a secure multiparty computation application enabled by quantum oblivious transfer (QOT)<n>The QOT protocol uses polarization-encoded entangled states to share oblivious keys between two parties with quantum key distribution (QKD) providing authentication.<n>A practical use case is demonstrated for privacy-preserving fingerprint matching against no-fly lists from Interpol and the United Nations.
arXiv Detail & Related papers (2025-01-09T15:51:30Z) - Practical hybrid PQC-QKD protocols with enhanced security and performance [44.8840598334124]
We develop hybrid protocols by which QKD and PQC inter-operate within a joint quantum-classical network.
In particular, we consider different hybrid designs that may offer enhanced speed and/or security over the individual performance of either approach.
arXiv Detail & Related papers (2024-11-02T00:02:01Z) - Towards efficient and secure quantum-classical communication networks [47.27205216718476]
There are two primary approaches to achieving quantum-resistant security: quantum key distribution (QKD) and post-quantum cryptography (PQC)
We introduce the pros and cons of these protocols and explore how they can be combined to achieve a higher level of security and/or improved performance in key distribution.
We hope our discussion inspires further research into the design of hybrid cryptographic protocols for quantum-classical communication networks.
arXiv Detail & Related papers (2024-11-01T23:36:19Z) - Experimental composable key distribution using discrete-modulated continuous variable quantum cryptography [1.9464379888286716]
We present the first experimental demonstration of a four-state DM CVQKD system, successfully generating composable finite-size keys.
This accomplishment is enabled by using an advanced security proof.
Results mark a significant step toward the large-scale deployment of practical, high-performance, cost-effective, and highly secure quantum key distribution networks.
arXiv Detail & Related papers (2024-10-17T16:05:08Z) - Twin-field-based multi-party quantum key agreement [0.0]
We study a method to extend the twin-field key distribution protocol to a scheme for multi-party quantum key agreement.
We derive the key rate based on the entanglement-based source-replacement scheme.
arXiv Detail & Related papers (2024-09-06T11:51:10Z) - Practical quantum secure direct communication with squeezed states [55.41644538483948]
We report the first table-top experimental demonstration of a CV-QSDC system and assess its security.
This realization paves the way into future threat-less quantum metropolitan networks, compatible with coexisting advanced wavelength division multiplexing (WDM) systems.
arXiv Detail & Related papers (2023-06-25T19:23:42Z) - Phase-Matching Quantum Key Distribution without Intensity Modulation [25.004151934190965]
We propose a phase-matching quantum key distribution protocol without intensity modulation.
Simulation results show that the transmission distance of our protocol could reach 305 km in telecommunication fiber.
Our protocol provides a promising solution for constructing quantum networks.
arXiv Detail & Related papers (2023-03-21T04:32:01Z) - High-rate continuous-variable measurement device-independent quantum key distribution with finite-size security [0.0]
Continuous-variable (CV) measurement-device-independent (MDI) QKD is a promising candidate for creating various quantum network topologies.
Here, we report the first experimental validation of a CV MDI-QKD system, achieving a secure key rate of 2.6 Mbit/s against collective attacks.
arXiv Detail & Related papers (2023-03-02T22:20:29Z) - High-Rate Point-to-Multipoint Quantum Key Distribution using Coherent
States [6.058240259980149]
Quantum key distribution (QKD) which enables information-theoretically security is now heading towards quantum secure networks.
It requires high-performance and cost-effective protocols while increasing the number of users.
Here, we show a 'protocol solution' using continuous-variable quantum information.
arXiv Detail & Related papers (2023-02-05T14:21:33Z) - Overcoming fundamental bounds on quantum conference key agreement [0.0]
Twin-Field Quantum Key Distribution (TF-QKD) enables two distant parties to establish a shared secret key.
TF-QKD is the only scheme capable of beating the repeaterless bound on the bipartite private capacity.
We propose a practical conference key agreement protocol that only uses WCPs and linear optics and prove its security with a multiparty decoy-state method.
arXiv Detail & Related papers (2022-11-28T17:09:41Z) - Experimental Demonstration of Discrete Modulation Formats for Continuous
Variable Quantum Key Distribution [0.23090185577016442]
Quantum key distribution (QKD) enables the establishment of secret keys between users connected via a channel vulnerable to eavesdropping.
We experimentally implement a protocol that allows for arbitrary, Gaussian-like, discrete modulations, whose security is based on a theoretical proof.
These modulation formats are compatible with the use of powerful tools of coherent optical telecommunication, allowing our system to reach a performance of tens of megabit per second secret key rates over 25 km.
arXiv Detail & Related papers (2022-07-24T09:45:07Z) - Conference key agreement in a quantum network [67.410870290301]
Quantum conference key agreement (QCKA) allows multiple users to establish a secure key from a shared multi-partite entangled state.
In a quantum network, this protocol can be efficiently implemented using a single copy of a N-qubit Greenberger-Horne-Zeilinger (GHZ) state to distil a secure N-user conference key bit.
arXiv Detail & Related papers (2022-07-04T18:00:07Z) - Composable security for continuous variable quantum key distribution:
Trust levels and practical key rates in wired and wireless networks [0.0]
Continuous variable (CV) quantum key distribution (QKD) provides a powerful setting for secure quantum communications.
We study the composable finite-size security of CV-QKD with Gaussian-modulated coherent-state protocols.
We show that high key rates are achievable for short-range optical wireless (LiFi) in secure quantum networks with both fixed and mobile devices.
arXiv Detail & Related papers (2022-03-01T19:04:43Z) - Towards fully-fledged quantum and classical communication over deployed
fiber with up-conversion module [47.187609203210705]
We propose and demonstrate a new method, based on up-conversion assisted receiver, for co-propagating classical light and QKD signals.
Our proposal exhibits higher tolerance for noise in comparison to the standard receiver, thus enabling the distribution of secret keys in the condition of 4 dB-higher classical power.
arXiv Detail & Related papers (2021-06-09T13:52:27Z) - Composably secure data processing for Gaussian-modulated continuous
variable quantum key distribution [58.720142291102135]
Continuous-variable quantum key distribution (QKD) employs the quadratures of a bosonic mode to establish a secret key between two remote parties.
We consider a protocol with homodyne detection in the general setting of composable finite-size security.
In particular, we analyze the high signal-to-noise regime which requires the use of high-rate (non-binary) low-density parity check codes.
arXiv Detail & Related papers (2021-03-30T18:02:55Z) - Round-robin differential phase-time-shifting protocol for quantum key
distribution: theory and experiment [58.03659958248968]
Quantum key distribution (QKD) allows the establishment of common cryptographic keys among distant parties.
Recently, a QKD protocol that circumvents the need for monitoring signal disturbance, has been proposed and demonstrated in initial experiments.
We derive the security proofs of the round-robin differential phase-time-shifting protocol in the collective attack scenario.
Our results show that the RRDPTS protocol can achieve higher secret key rate in comparison with the RRDPS, in the condition of high quantum bit error rate.
arXiv Detail & Related papers (2021-03-15T15:20:09Z) - Experimental quantum conference key agreement [55.41644538483948]
Quantum networks will provide multi-node entanglement over long distances to enable secure communication on a global scale.
Here we demonstrate quantum conference key agreement, a quantum communication protocol that exploits multi-partite entanglement.
We distribute four-photon Greenberger-Horne-Zeilinger (GHZ) states generated by high-brightness, telecom photon-pair sources across up to 50 km of fibre.
arXiv Detail & Related papers (2020-02-04T19:00:31Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.