Eavesdropping on the BB84 Protocol using Phase-Covariant Cloning: Experimental Results
- URL: http://arxiv.org/abs/2409.16284v1
- Date: Tue, 24 Sep 2024 17:57:40 GMT
- Title: Eavesdropping on the BB84 Protocol using Phase-Covariant Cloning: Experimental Results
- Authors: Brian Pigott, Elizabeth Campolongo, Hardik Routray, Alex Khan,
- Abstract summary: BB84 protocol has provable security over a noiseless quantum channel.
The level of tolerable error on such systems is still unclear, as is how much information about a raw key may be obtained by an eavesdropper.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Though the BB84 protocol has provable security over a noiseless quantum channel, the security is not proven over current noisy technology. The level of tolerable error on such systems is still unclear, as is how much information about a raw key may be obtained by an eavesdropper. We develop a reproducible test to determine the security--or lack thereof--of the protocol in practice. This enables us to obtain an experimental estimate of the information that can be obtained using asymmetric phase-covariant cloning to eavesdrop on the BB84 protocol.
Related papers
- Security of the BB84 protocol with receiver's passive biased basis choice [0.0]
Bennett-Brassard 1984 protocol (BB84 protocol) is one of the simplest protocols for implementing quantum key distribution (QKD)<n>In the protocol, the sender and the receiver iteratively choose one of two complementary measurement bases.<n>We present a fully analytical security proof for such a decoy-state BB84 protocol with receiver's passive basis choice and measurement with threshold detectors.
arXiv Detail & Related papers (2025-07-06T05:18:45Z) - QKD security proofs for decoy-state BB84: protocol variations, proof techniques, gaps and limitations [0.0]
We discuss the status of security proofs for practical decoy-state Quantum Key Distribution using the BB84 protocol.
Our focus is on the gaps in the existing literature.
arXiv Detail & Related papers (2025-02-14T18:02:30Z) - Universal quantum computation via scalable measurement-free error correction [45.29832252085144]
We show that universal quantum computation can be made fault-tolerant in a scenario where the error-correction is implemented without mid-circuit measurements.<n>We introduce a measurement-free deformation protocol of the Bacon-Shor code to realize a logical $mathitCCZ$ gate.<n>In particular, our findings support that below-breakeven logical performance is achievable with a circuit-level error rate below $10-3$.
arXiv Detail & Related papers (2024-12-19T18:55:44Z) - Decoherence-assisted quantum key distribution [37.69303106863453]
We show that our method reduces the amount of information that an eavesdropper can obtain in the BB84 protocol under the entangling probe attack.
We demonstrate experimentally that Alice and Bob can agree on a scheme to that gives low values of the quantum bit error rate.
arXiv Detail & Related papers (2024-05-30T15:28:07Z) - General treatment of Gaussian trusted noise in continuous variable
quantum key distribution [1.0499611180329804]
A trusted device scenario assumes that an adversary has no access to imperfections such as electronic noises in the detector is expected to provide significant improvement in the key rate.
Here, we develop a simple and general treatment that can incorporate the effects of Gaussian trusted noises for any protocol that uses homodyne/heterodyne measurements.
In our method, a rescaling of the outcome of a noisy homodyne/heterodyne detector renders it equivalent to the outcome of a noiseless detector with a tiny additional loss.
arXiv Detail & Related papers (2023-05-28T10:38:36Z) - Semi-device independent nonlocality certification for near-term quantum
networks [46.37108901286964]
Bell tests are the most rigorous method for verifying entanglement in quantum networks.
If there is any signaling between the parties, then the violation of Bell inequalities can no longer be used.
We propose a semi-device independent protocol that allows us to numerically correct for effects of correlations in experimental probability distributions.
arXiv Detail & Related papers (2023-05-23T14:39:08Z) - Single-photon-memory measurement-device-independent quantum secure
direct communication [63.75763893884079]
Quantum secure direct communication (QSDC) uses the quantum channel to transmit information reliably and securely.
In order to eliminate the security loopholes resulting from practical detectors, the measurement-device-independent (MDI) QSDC protocol has been proposed.
We propose a single-photon-memory MDI QSDC protocol (SPMQC) for dispensing with high-performance quantum memory.
arXiv Detail & Related papers (2022-12-12T02:23:57Z) - Modified BB84 quantum key distribution protocol robust to source
imperfections [1.53934570513443]
Bennett-Brassard 1984 (BB84) protocol is the most widely implemented quantum key distribution scheme.
We prove the security of the BB84 protocol in the presence of multiple source imperfections.
We show that the addition of a fourth state, while redundant in ideal conditions, significantly improves the estimation of the leaked information.
arXiv Detail & Related papers (2022-10-21T06:23:01Z) - QKD in the NISQ era: enhancing secure key rates via quantum error
correction [2.209900332048239]
We obtain the secure key rates of BB84, B92 and BBM92 QKD protocols over a quantum channel subject to amplitude-damping noise.
We implement an error-corrected BB84 protocol using dual-rail encoding on a noisy quantum processor.
arXiv Detail & Related papers (2022-10-11T09:47:14Z) - Thermal relaxation error on QKD: Effect and A Probable Bypass [0.0]
Quantum cryptography was proposed as a counter to the capacity of quantum computers to break classical cryptosystems.
We study the performance of two QKD protocols - BB84 and E91 under thermal relaxation error.
arXiv Detail & Related papers (2022-07-04T01:46:41Z) - Data post-processing for the one-way heterodyne protocol under
composable finite-size security [62.997667081978825]
We study the performance of a practical continuous-variable (CV) quantum key distribution protocol.
We focus on the Gaussian-modulated coherent-state protocol with heterodyne detection in a high signal-to-noise ratio regime.
This allows us to study the performance for practical implementations of the protocol and optimize the parameters connected to the steps above.
arXiv Detail & Related papers (2022-05-20T12:37:09Z) - Fault-tolerant parity readout on a shuttling-based trapped-ion quantum
computer [64.47265213752996]
We experimentally demonstrate a fault-tolerant weight-4 parity check measurement scheme.
We achieve a flag-conditioned parity measurement single-shot fidelity of 93.2(2)%.
The scheme is an essential building block in a broad class of stabilizer quantum error correction protocols.
arXiv Detail & Related papers (2021-07-13T20:08:04Z) - Composably secure data processing for Gaussian-modulated continuous
variable quantum key distribution [58.720142291102135]
Continuous-variable quantum key distribution (QKD) employs the quadratures of a bosonic mode to establish a secret key between two remote parties.
We consider a protocol with homodyne detection in the general setting of composable finite-size security.
In particular, we analyze the high signal-to-noise regime which requires the use of high-rate (non-binary) low-density parity check codes.
arXiv Detail & Related papers (2021-03-30T18:02:55Z) - Round-robin differential phase-time-shifting protocol for quantum key
distribution: theory and experiment [58.03659958248968]
Quantum key distribution (QKD) allows the establishment of common cryptographic keys among distant parties.
Recently, a QKD protocol that circumvents the need for monitoring signal disturbance, has been proposed and demonstrated in initial experiments.
We derive the security proofs of the round-robin differential phase-time-shifting protocol in the collective attack scenario.
Our results show that the RRDPTS protocol can achieve higher secret key rate in comparison with the RRDPS, in the condition of high quantum bit error rate.
arXiv Detail & Related papers (2021-03-15T15:20:09Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.