Quantum key distribution with imperfectly isolated devices
- URL: http://arxiv.org/abs/2411.13948v1
- Date: Thu, 21 Nov 2024 08:59:32 GMT
- Title: Quantum key distribution with imperfectly isolated devices
- Authors: Xoel Sixto, Álvaro Navarrete, Margarida Pereira, Guillermo Currás-Lorenzo, Kiyoshi Tamaki, Marcos Curty,
- Abstract summary: We introduce a security proof in the presence of information leakage from all state preparation settings for the decoy-state BB84 protocol.
The proof requires minimal experimental characterization, as only a single parameter related to the isolation of the source needs to be determined.
- Score: 0.32985979395737774
- License:
- Abstract: Most security proofs of quantum key distribution (QKD) assume that there is no unwanted information leakage about the state preparation process. However, this assumption is impossible to guarantee in practice, as QKD systems can leak information to the channel due to device imperfections or the active action of an eavesdropper. Here, we solve this pressing issue by introducing a security proof in the presence of information leakage from all state preparation settings for arguably the most popular QKD scheme, namely the decoy-state BB84 protocol. The proof requires minimal experimental characterization, as only a single parameter related to the isolation of the source needs to be determined, thus providing a clear path for bridging the gap between theory and practice. Moreover, if information about the state of the side channels is available, this can be readily incorporated into the analysis to further improve the resulting performance.
Related papers
- Practical quantum secure direct communication with squeezed states [55.41644538483948]
We report the first table-top experimental demonstration of a CV-QSDC system and assess its security.
This realization paves the way into future threat-less quantum metropolitan networks, compatible with coexisting advanced wavelength division multiplexing (WDM) systems.
arXiv Detail & Related papers (2023-06-25T19:23:42Z) - Robust and efficient verification of graph states in blind
measurement-based quantum computation [52.70359447203418]
Blind quantum computation (BQC) is a secure quantum computation method that protects the privacy of clients.
It is crucial to verify whether the resource graph states are accurately prepared in the adversarial scenario.
Here, we propose a robust and efficient protocol for verifying arbitrary graph states with any prime local dimension.
arXiv Detail & Related papers (2023-05-18T06:24:45Z) - A security framework for quantum key distribution implementations [1.2815904071470707]
We present a security proof in the finite-key regime against coherent attacks.
Our proof requires minimal state characterization, which facilitates its application to real-life implementations.
arXiv Detail & Related papers (2023-05-10T07:02:32Z) - The Quantum Chernoff Divergence in Advantage Distillation for QKD and
DIQKD [0.0]
Device-independent quantum key distribution (DIQKD) aims to mitigate adversarial exploitation of imperfections in quantum devices.
We present an alternative proof structure that replaces the fidelity with the quantum Chernoff divergence.
Our results provide insight into a fundamental question in quantum information theory regarding the circumstances under which DIQKD is possible.
arXiv Detail & Related papers (2022-12-14T01:44:23Z) - Data post-processing for the one-way heterodyne protocol under
composable finite-size security [62.997667081978825]
We study the performance of a practical continuous-variable (CV) quantum key distribution protocol.
We focus on the Gaussian-modulated coherent-state protocol with heterodyne detection in a high signal-to-noise ratio regime.
This allows us to study the performance for practical implementations of the protocol and optimize the parameters connected to the steps above.
arXiv Detail & Related papers (2022-05-20T12:37:09Z) - Measurement-device-independent quantum key distribution with insecure
sources [11.835944016730302]
Measurement-device-independent quantum key distribution (MDI-QKD) can eliminate all detector side-channel loopholes and has shown excellent performance in long-distance secret keys sharing.
Here, we present a general formalism based on reference technique to prove proofs of MDI-QKD against any possible sources imperfection/or side channels.
arXiv Detail & Related papers (2021-07-16T10:14:57Z) - Sample-efficient device-independent quantum state verification and
certification [68.8204255655161]
Authentication of quantum sources is a crucial task in building reliable and efficient protocols for quantum-information processing.
We develop a systematic approach to device-independent verification of quantum states free of IID assumptions in the finite copy regime.
We show that device-independent verification can be performed with optimal sample efficiency.
arXiv Detail & Related papers (2021-05-12T17:48:04Z) - Composably secure data processing for Gaussian-modulated continuous
variable quantum key distribution [58.720142291102135]
Continuous-variable quantum key distribution (QKD) employs the quadratures of a bosonic mode to establish a secret key between two remote parties.
We consider a protocol with homodyne detection in the general setting of composable finite-size security.
In particular, we analyze the high signal-to-noise regime which requires the use of high-rate (non-binary) low-density parity check codes.
arXiv Detail & Related papers (2021-03-30T18:02:55Z) - Round-robin differential phase-time-shifting protocol for quantum key
distribution: theory and experiment [58.03659958248968]
Quantum key distribution (QKD) allows the establishment of common cryptographic keys among distant parties.
Recently, a QKD protocol that circumvents the need for monitoring signal disturbance, has been proposed and demonstrated in initial experiments.
We derive the security proofs of the round-robin differential phase-time-shifting protocol in the collective attack scenario.
Our results show that the RRDPTS protocol can achieve higher secret key rate in comparison with the RRDPS, in the condition of high quantum bit error rate.
arXiv Detail & Related papers (2021-03-15T15:20:09Z) - Practical Quantum Key Distribution Secure Against Side-Channels [0.0]
We introduce a measurement-device-independent (MDI) QKD type of protocol based on the transmission of coherent light.
We prove its security against any possible device imperfection and/or side-channel at the transmitters' side.
The performance of the protocol is comparable to other MDI-QKD type of protocols which disregard the effect of several side-channels.
arXiv Detail & Related papers (2020-07-07T11:56:04Z) - Measurement-Device-Independent Quantum Key Distribution with Leaky
Sources [0.0]
Measurement-device-independent quantum key distribution (MDI-QKD) can remove all detection side-channels from quantum communication systems.
We show that MDI-QKD is feasible within a reasonable time frame of signal transmission given that the sources are sufficiently isolated.
arXiv Detail & Related papers (2020-01-21T08:19:21Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.