Security of Device-independent Quantum Key Distribution under Sequential Attack
- URL: http://arxiv.org/abs/2411.16822v3
- Date: Mon, 29 Sep 2025 15:33:37 GMT
- Title: Security of Device-independent Quantum Key Distribution under Sequential Attack
- Authors: Pritam Roy, Souradeep Sasmal, Subhankar Bera, Shashank Gupta, Arup Roy, A. S. Majumdar,
- Abstract summary: Device-independent quantum key distribution (DI-QKD) leverages nonlocal correlations to establish cryptographic keys between two honest parties.<n>Bell violations ensure the intrinsic unpredictability of observed statistics, independent of the trustworthiness of the devices.<n>We show that by using sequential measurements with an ancilla stored in quantum memory, Eve can mimic a collective attack within certain parameter ranges, even without initial control of the source.
- Score: 1.3533215914750014
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Device-independent quantum key distribution (DI-QKD) leverages nonlocal correlations to establish cryptographic keys between two honest parties while making minimal assumptions about the underlying systems. The security of DI-QKD is grounded in the validity of quantum theory, with Bell violations ensuring the intrinsic unpredictability of observed statistics, independent of the trustworthiness of the devices. While traditional collective QKD attacks involve an adversary preparing the shared system for the users, we analyse a scenario in which the adversary does not control the preparation devices yet can still extract information about the key using a strategy known as the sequential attack. In this approach, an eavesdropper (Eve) intercepts the transmitted quantum particle, performs an unsharp measurement to maintain the Bell violation between the honest parties, and disguises her interference as noise. This method enables Eve to acquire relevant information about the key without resorting to collective measurements. We show that by using sequential measurements with an ancilla stored in quantum memory, Eve can mimic a collective attack within certain parameter ranges, even without initial control of the source.
Related papers
- Secure One-Sided Device-Independent Quantum Key Distribution Under Collective Attacks with Enhanced Robustness [0.0]
We study the security of a quantum key distribution protocol under the one-sided device-independent (1sDI) setting.<n>We show that the protocol tolerates higher quantum bit error rates (QBER) than present DI-QKD protocols.
arXiv Detail & Related papers (2025-07-24T18:47:04Z) - Quantum Skyshield: Quantum Key Distribution and Post-Quantum Authentication for Low-Altitude Wireless Networks in Adverse Skies [36.14072181405793]
Low-altitude wireless networks (LAWNs) have emerged as a critical backbone for supporting the low-altitude economy.<n>To meet growing data demands, some LAWN deployments incorporate free-space optical (FSO) links, which offer exceptional bandwidth and beam directivity.<n>Quantum Skyshield is proposed to enable reliable communication between the base transceiver station (BTS) and LAWN.
arXiv Detail & Related papers (2025-07-20T04:43:33Z) - Quantum Internet in a Nutshell -- Advancing Quantum Communication with Ion Traps [25.519081784735068]
We study the incorporation of small quantum error correction codes into quantum communication protocols.<n>We find that these codes can help to suppress the noise level and to monitor the noise profile of the channel.
arXiv Detail & Related papers (2025-07-18T22:07:54Z) - Secure quantum key distribution against correlated leakage source [20.01403427477703]
Quantum key distribution (QKD) provides information theoretic security based on quantum mechanics.<n>Among various source loopholes, correlations between transmitted pulses pose a significant yet underexplored security risk.<n>We propose a security analysis framework for QKD under correlations, enabling finite-key analysis for the first time.
arXiv Detail & Related papers (2025-07-15T12:23:24Z) - Device-Independent Quantum Key Distribution: Protocols, Quantum Games, and Security [0.0]
Quantum Key Distribution (QKD) is based on the laws of quantum mechanics to enable provably secure communication.<n>Despite its theoretical security promise, practical QKD systems are vulnerable to serious attacks, including side-channel attacks and detector loopholes.<n> Device-Independent Quantum Key Distribution (DIQKD) overcomes these limitations by relying solely on observed nonlocal correlations.
arXiv Detail & Related papers (2025-05-20T11:52:21Z) - Device-independent secure correlations in sequential quantum scenarios [44.99833362998488]
Device-independent quantum information is attracting significant attention, particularly for its applications in information security.<n>We propose a systematic approach to designing sequential quantum protocols for device-independent security.<n>We analytically prove that, with this systematic construction, the resulting ideal correlations are secure in the sense that they cannot be reproduced as a statistical mixture of other correlations.
arXiv Detail & Related papers (2025-03-18T16:45:20Z) - Breaking Quantum Key Distributions under Quantum Switch-Based Attack [0.0]
We introduce a new attack scenario where an eavesdropper, Eve, exploits a quantum switch using the indefinite causal order to intercept and manipulate quantum communication channel.
Our results highlight a previously overlooked vulnerability, emphasizing the need for countermeasures against quantum-controlled adversarial strategies.
arXiv Detail & Related papers (2025-02-10T18:56:47Z) - Loss-tolerant quantum key distribution with detection efficiency mismatch [39.58317527488534]
We establish a security proof for the loss-tolerant P&M QKD protocol that incorporates imperfections in both the source and the detectors.
Specifically, we demonstrate the security of this scheme when the emitted states deviate from the ideal ones.
arXiv Detail & Related papers (2024-12-12T19:01:56Z) - Quantum-Secured Data Centre Interconnect in a field environment [38.4938584033229]
Quantum key distribution (QKD) is an established quantum technology at a high readiness level.
In this article, we present the successful implementation of a QKD field trial within a commercial data centre environment.
The achieved average secret key rate of 2.392 kbps and an average quantum bit error rate of less than 2% demonstrate the commercial feasibility of QKD in real-world scenarios.
arXiv Detail & Related papers (2024-10-14T08:05:25Z) - Empirical Risk-aware Machine Learning on Trojan-Horse Detection for Trusted Quantum Key Distribution Networks [31.857236131842843]
Quantum key distribution (QKD) is a cryptographic technique that offers high levels of data security during transmission.
The existence of a gap between theoretical concepts and practical implementation has raised concerns about the trustworthiness of QKD networks.
We propose the implementation of risk-aware machine learning techniques that present risk analysis for Trojan-horse attacks over the time-variant quantum channel.
arXiv Detail & Related papers (2024-01-26T03:36:13Z) - Eavesdropper localization for quantum and classical channels via
nonlinear scattering [58.720142291102135]
Quantum key distribution (QKD) offers theoretical security based on the laws of physics.
We present a novel approach to eavesdropper location that can be employed in quantum as well as classical channels.
We demonstrate that our approach outperforms conventional OTDR in the task of localizing an evanescent outcoupling of 1% with cm precision inside standard optical fibers.
arXiv Detail & Related papers (2023-06-25T21:06:27Z) - Security of differential phase shift QKD against explicit individual
attacks [1.9849264945671103]
We characterize the security of the 3 and n-pulse Differential Phase Shift Quantum Key Distribution protocols against individual attacks.
We compare the secure key rates thus obtained with the known lower bounds under a general individual attack.
arXiv Detail & Related papers (2023-05-19T16:56:26Z) - Phase-Matching Quantum Key Distribution without Intensity Modulation [25.004151934190965]
We propose a phase-matching quantum key distribution protocol without intensity modulation.
Simulation results show that the transmission distance of our protocol could reach 305 km in telecommunication fiber.
Our protocol provides a promising solution for constructing quantum networks.
arXiv Detail & Related papers (2023-03-21T04:32:01Z) - Tight finite-key analysis for mode-pairing quantum key distribution [21.81489337632085]
We analyze the finite-key effect for the MP-QKD protocol with rigorous security proof against general attacks.
We propose a six-state MP-QKD protocol and analyze its finite-key effect.
arXiv Detail & Related papers (2023-02-27T02:35:52Z) - Upper bounds on key rates in device-independent quantum key distribution
based on convex-combination attacks [1.118478900782898]
We present the convex-combination attack as an efficient, easy-to-use technique for upper-bounding DIQKD key rates.
It allows verifying the accuracy of lower bounds on key rates for state-of-the-art protocols.
arXiv Detail & Related papers (2022-06-13T15:27:48Z) - Security of quantum key distribution from generalised entropy
accumulation [2.1030878979833467]
We provide a formal framework for general quantum key distribution protocols.
We show that security against general attacks reduces to security against collective attacks.
Our proof relies on a recently developed information-theoretic tool called generalised entropy accumulation.
arXiv Detail & Related papers (2022-03-09T19:00:07Z) - Device-Independent-Quantum-Randomness-Enhanced Zero-Knowledge Proof [25.758352536166502]
Zero-knowledge proof (ZKP) is a fundamental cryptographic primitive that allows a prover to convince a verifier of the validity of a statement.
As an efficient variant of ZKP, non-interactive zero-knowledge proof (NIZKP) adopting the Fiat-Shamir is essential to a wide spectrum of applications.
arXiv Detail & Related papers (2021-11-12T13:36:43Z) - Foiling zero-error attacks against coherent-one-way quantum key
distribution [0.0]
coherent-one-way (COW) QKD is commercially available.
It has been shown very recently that its secret key rate scales quadratically with the channel transmittance.
We study various countermeasures to foil zero-error attacks against COW-QKD.
arXiv Detail & Related papers (2021-08-27T17:01:14Z) - Unbalanced-basis-misalignment tolerant measurement-device-independent
quantum key distribution [22.419105320267523]
Measurement-device-independent quantum key distribution (MDIQKD) is a revolutionary protocol since it is physically immune to all attacks on the detection side.
Some protocols release part of the assumptions in the encoding system to keep the practical security, but the performance would be dramatically reduced.
We present a MDIQKD protocol that requires less knowledge of encoding system to combat the troublesome modulation errors and fluctuations.
arXiv Detail & Related papers (2021-08-27T02:16:20Z) - Nonclassical Attack on a Quantum KeyDistribution System [0.0]
The article is focused on research of an attack on the quantum key distribution system and proposes a countermeasure method.
Results of the research show that quantum key distribution systems have vulnerabilities not only in the protocols, but also in other vital system components.
arXiv Detail & Related papers (2021-04-28T11:49:52Z) - Bell nonlocality is not sufficient for the security of standard
device-independent quantum key distribution protocols [1.9573380763700712]
Device-independent quantum key distribution is a secure quantum cryptographic paradigm that allows two honest users to establish a secret key.
We show that no protocol of this form allows for establishing a secret key when implemented on any correlation obtained by measuring local projective measurements.
arXiv Detail & Related papers (2021-03-03T19:10:06Z) - Noiseless attack and counterfactual security of quantum key distribution [0.0]
We show that the efficiency of counterfactual QKD protocols can be enhanced by including non-counterfactual bits.
We show how this problem can be resolved in a simple way, whereby the non-counterfactual key bits are indicated to be secure.
This method of enhancing the key rate is shown to be applicable to various existing quantum counterfactual key distribution protocols.
arXiv Detail & Related papers (2020-12-09T16:48:43Z) - Backflash Light as a Security Vulnerability in Quantum Key Distribution
Systems [77.34726150561087]
We review the security vulnerabilities of quantum key distribution (QKD) systems.
We mainly focus on a particular effect known as backflash light, which can be a source of eavesdropping attacks.
arXiv Detail & Related papers (2020-03-23T18:23:12Z) - Experimental composable security decoy-state quantum key distribution
using time-phase encoding [19.037123608278602]
We provide the rigorous finite-key security bounds for four-intensity decoy-state BB84 QKD against coherent attacks.
We build a time-phase encoding system with 200 MHz clocked to implement this protocol, in which the real-time secret key rate is more than 60 kbps over 50 km single-mode fiber.
arXiv Detail & Related papers (2020-02-25T04:59:43Z) - Efficient decoy-states for the reference-frame-independent
measurement-device-independent quantum key distribution [22.452971995801686]
RFI-MDI-QKD eliminates all possible attacks on detector side and necessity of reference-frame alignment in source sides.
The performance of RFI-MDI-QKD is greatly improved in terms of secret key rate and achievable distance when statistical fluctuations are considered.
arXiv Detail & Related papers (2020-02-10T11:52:53Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.