Sequential Attack Impairs Security in Device-independent Quantum Key Distribution
- URL: http://arxiv.org/abs/2411.16822v2
- Date: Thu, 12 Dec 2024 11:53:11 GMT
- Title: Sequential Attack Impairs Security in Device-independent Quantum Key Distribution
- Authors: Pritam Roy, Souradeep Sasmal, Subhankar Bera, Shashank Gupta, Arup Roy, A. S. Majumdar,
- Abstract summary: Device-independent quantum key distribution (DI-QKD)
Uses nonlocal correlations to securely establish cryptographic keys between two honest parties.
Bell violations ensure the inherent unpredictability of the observed statistics.
- Score: 1.0140308935829423
- License:
- Abstract: Device-independent quantum key distribution (DI-QKD) leverages nonlocal correlations to securely establish cryptographic keys between two honest parties while making minimal assumptions about the underlying systems. The security of DI-QKD relies on the validation of quantum theory, with Bell violations ensuring the inherent unpredictability of the observed statistics, independent of the trustworthiness of the devices. While traditional QKD attacks are generally categorised as individual, collective, or coherent attacks, we introduce a novel attack strategy-the sequential attack. In this approach, Eve intercepts the transmitted quantum particle, performs an unsharp measurement to preserve the Bell violation between the honest parties, and disguises her interference as noise. Such a strategy enables Eve to extract substantial information about the key, even without performing collective measurements. Furthermore, when combined with collective attack, this strategy significantly reduces the secure key rate and, under certain conditions, can render it to zero. We show that within specific ranges of Bell violations and quantum bit error rates, the cumulative effect of sequential and collective attacks poses a stronger threat to DI-QKD security than collective attacks alone. These findings underscore the vulnerability of DI-QKD to real-world imperfections, emphasising that Bell nonlocality alone is insufficient to guarantee security in practical implementations.
Related papers
- Breaking Quantum Key Distributions under Quantum Switch-Based Attack [0.0]
We introduce a new attack scenario where an eavesdropper, Eve, exploits a quantum switch using the indefinite causal order to intercept and manipulate quantum communication channel.
Our results highlight a previously overlooked vulnerability, emphasizing the need for countermeasures against quantum-controlled adversarial strategies.
arXiv Detail & Related papers (2025-02-10T18:56:47Z) - Loss-tolerant quantum key distribution with detection efficiency mismatch [39.58317527488534]
We establish a security proof for the loss-tolerant P&M QKD protocol that incorporates imperfections in both the source and the detectors.
Specifically, we demonstrate the security of this scheme when the emitted states deviate from the ideal ones.
arXiv Detail & Related papers (2024-12-12T19:01:56Z) - Quantum-Secured Data Centre Interconnect in a field environment [38.4938584033229]
Quantum key distribution (QKD) is an established quantum technology at a high readiness level.
In this article, we present the successful implementation of a QKD field trial within a commercial data centre environment.
The achieved average secret key rate of 2.392 kbps and an average quantum bit error rate of less than 2% demonstrate the commercial feasibility of QKD in real-world scenarios.
arXiv Detail & Related papers (2024-10-14T08:05:25Z) - Security of differential phase shift QKD against explicit individual
attacks [1.9849264945671103]
We characterize the security of the 3 and n-pulse Differential Phase Shift Quantum Key Distribution protocols against individual attacks.
We compare the secure key rates thus obtained with the known lower bounds under a general individual attack.
arXiv Detail & Related papers (2023-05-19T16:56:26Z) - Phase-Matching Quantum Key Distribution without Intensity Modulation [25.004151934190965]
We propose a phase-matching quantum key distribution protocol without intensity modulation.
Simulation results show that the transmission distance of our protocol could reach 305 km in telecommunication fiber.
Our protocol provides a promising solution for constructing quantum networks.
arXiv Detail & Related papers (2023-03-21T04:32:01Z) - Tight finite-key analysis for mode-pairing quantum key distribution [21.81489337632085]
We analyze the finite-key effect for the MP-QKD protocol with rigorous security proof against general attacks.
We propose a six-state MP-QKD protocol and analyze its finite-key effect.
arXiv Detail & Related papers (2023-02-27T02:35:52Z) - Security of quantum key distribution from generalised entropy
accumulation [2.1030878979833467]
We provide a formal framework for general quantum key distribution protocols.
We show that security against general attacks reduces to security against collective attacks.
Our proof relies on a recently developed information-theoretic tool called generalised entropy accumulation.
arXiv Detail & Related papers (2022-03-09T19:00:07Z) - Foiling zero-error attacks against coherent-one-way quantum key
distribution [0.0]
coherent-one-way (COW) QKD is commercially available.
It has been shown very recently that its secret key rate scales quadratically with the channel transmittance.
We study various countermeasures to foil zero-error attacks against COW-QKD.
arXiv Detail & Related papers (2021-08-27T17:01:14Z) - Noiseless attack and counterfactual security of quantum key distribution [0.0]
We show that the efficiency of counterfactual QKD protocols can be enhanced by including non-counterfactual bits.
We show how this problem can be resolved in a simple way, whereby the non-counterfactual key bits are indicated to be secure.
This method of enhancing the key rate is shown to be applicable to various existing quantum counterfactual key distribution protocols.
arXiv Detail & Related papers (2020-12-09T16:48:43Z) - Backflash Light as a Security Vulnerability in Quantum Key Distribution
Systems [77.34726150561087]
We review the security vulnerabilities of quantum key distribution (QKD) systems.
We mainly focus on a particular effect known as backflash light, which can be a source of eavesdropping attacks.
arXiv Detail & Related papers (2020-03-23T18:23:12Z) - Efficient decoy-states for the reference-frame-independent
measurement-device-independent quantum key distribution [22.452971995801686]
RFI-MDI-QKD eliminates all possible attacks on detector side and necessity of reference-frame alignment in source sides.
The performance of RFI-MDI-QKD is greatly improved in terms of secret key rate and achievable distance when statistical fluctuations are considered.
arXiv Detail & Related papers (2020-02-10T11:52:53Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.