Overcoming Intensity Limits for Long-Distance Quantum Key Distribution
- URL: http://arxiv.org/abs/2412.20265v3
- Date: Sat, 22 Feb 2025 01:43:59 GMT
- Title: Overcoming Intensity Limits for Long-Distance Quantum Key Distribution
- Authors: Ibrahim Almosallam,
- Abstract summary: Quantum Key Distribution (QKD) enables the sharing of cryptographic keys secured by quantum mechanics.<n> BB84 protocol assumed single-photon sources, but practical systems rely on weak coherent pulses vulnerable to photon-number-splitting (PNS) attacks.<n>We develop a new approach to security in QKD by shifting from worst-case assumption analysis to observation-dependent inference.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Quantum Key Distribution (QKD) enables the sharing of cryptographic keys secured by quantum mechanics. The BB84 protocol assumed single-photon sources, but practical systems rely on weak coherent pulses vulnerable to photon-number-splitting (PNS) attacks. The Gottesman-Lo-L\"utkenhaus-Preskill (GLLP) framework addressed these imperfections, deriving secure key rate bounds under limited PNS scenarios. The Decoy-state protocol further improved performance by refining single-photon yield estimates, but still considered multi-photon states as insecure, thereby limiting intensities and constraining key rate and distance. More recently, finite-key security bounds for decoy-state QKD have been extended to address general attacks, ensuring security against adversaries capable of exploiting arbitrary strategies. In this work, we focus on a specific class of attacks, the generalized PNS attack, and demonstrate that higher pulse intensities can be securely used by employing Bayesian inference to estimate key parameters directly from observed data. By raising the pulse intensity to 10 photons, we achieve a 50-fold increase in key rate and a 62.2% increase in operational range (about 200 km) compared to the decoy-state protocol. Furthermore, we accurately model after-pulsing using a Hidden Markov Model and reveal inaccuracies in decoy-state calculations that may produce erroneous key-rate estimates. While this methodology does not address all possible attacks, it provides a new approach to security proofs in QKD by shifting from worst-case assumption analysis to observation-dependent inference, advancing the reach and efficiency of discrete-variable QKD protocols.
Related papers
- Characterising higher-order phase correlations in gain-switched laser sources with application to quantum key distribution [38.00713966087315]
Multi-photon emissions in laser sources represent a serious threat for the security of quantum key distribution.<n>We introduce experimental schemes to characterise the phase probability distribution of the emitted pulses.<n>We demonstrate that an optimisation task over interferometric measures suffices in determining the impact of arbitrary order correlations.
arXiv Detail & Related papers (2024-12-04T22:06:13Z) - Practical hybrid PQC-QKD protocols with enhanced security and performance [44.8840598334124]
We develop hybrid protocols by which QKD and PQC inter-operate within a joint quantum-classical network.
In particular, we consider different hybrid designs that may offer enhanced speed and/or security over the individual performance of either approach.
arXiv Detail & Related papers (2024-11-02T00:02:01Z) - Superior decoy state and purification quantum key distribution protocols for realistic quantum-dot based single photon sources [0.35342120781147623]
We experimentally emulate two simple-to-implement protocols that allow practical, far from ideal sub-Poissonian photon sources to outperform state-of-the-art WCS.
By engineering the photon statistics of a quantum dot's biexciton-exciton cascade, we show that either a truncated decoy state protocol or a heralded purification protocol can be employed.
arXiv Detail & Related papers (2024-09-12T11:07:50Z) - Empirical Risk-aware Machine Learning on Trojan-Horse Detection for Trusted Quantum Key Distribution Networks [31.857236131842843]
Quantum key distribution (QKD) is a cryptographic technique that offers high levels of data security during transmission.
The existence of a gap between theoretical concepts and practical implementation has raised concerns about the trustworthiness of QKD networks.
We propose the implementation of risk-aware machine learning techniques that present risk analysis for Trojan-horse attacks over the time-variant quantum channel.
arXiv Detail & Related papers (2024-01-26T03:36:13Z) - Phase-Matching Quantum Key Distribution without Intensity Modulation [25.004151934190965]
We propose a phase-matching quantum key distribution protocol without intensity modulation.
Simulation results show that the transmission distance of our protocol could reach 305 km in telecommunication fiber.
Our protocol provides a promising solution for constructing quantum networks.
arXiv Detail & Related papers (2023-03-21T04:32:01Z) - Quantum Key Distribution Using a Quantum Emitter in Hexagonal Boron
Nitride [48.97025221755422]
We demonstrate a room temperature, discrete-variable quantum key distribution system using a bright single photon source in hexagonal-boron nitride.
We have generated keys with one million bits length, and demonstrated a secret key of approximately 70,000 bits, at a quantum bit error rate of 6%.
Our work demonstrates the first proof of concept finite-key BB84 QKD system realised with hBN defects.
arXiv Detail & Related papers (2023-02-13T09:38:51Z) - Single-emitter quantum key distribution over 175 km of fiber with
optimised finite key rates [45.82374977939355]
We perform fibre-based quantum key distribution with a quantum dot frequency-converted to telecom wavelength.
We demonstrate positive key rates up to 175 km in the regime.
This result represents major progress towards the feasibility of long-distance single-emitter QKD networks.
arXiv Detail & Related papers (2022-09-07T18:03:36Z) - Upper bounds on key rates in device-independent quantum key distribution
based on convex-combination attacks [1.118478900782898]
We present the convex-combination attack as an efficient, easy-to-use technique for upper-bounding DIQKD key rates.
It allows verifying the accuracy of lower bounds on key rates for state-of-the-art protocols.
arXiv Detail & Related papers (2022-06-13T15:27:48Z) - Experimental measurement-device-independent type quantum key
distribution with flawed and correlated sources [14.143874849657317]
Security of quantum key distribution (QKD) is threatened by discrepancies between realistic devices and theoretical assumptions.
Here, we adopt the reference technique to prove security of an efficient four-phase measurement-device-independent QKD using laser pulses against potential source imperfections.
In addition, we demonstrate the feasibility of our protocol through a proof-of-principle experimental implementation and achieve a secure key rate of 253 bps with a 20 dB channel loss.
arXiv Detail & Related papers (2022-04-18T13:44:51Z) - Efficient room-temperature molecular single-photon sources for quantum
key distribution [51.56795970800138]
Quantum Key Distribution (QKD) allows the distribution of cryptographic keys between multiple users in an information-theoretic secure way.
We introduce and demonstrate a proof-of-concept QKD system exploiting a molecule-based single-photon source operating at room temperature and emitting at 785nm.
arXiv Detail & Related papers (2022-02-25T11:52:10Z) - Foiling zero-error attacks against coherent-one-way quantum key
distribution [0.0]
coherent-one-way (COW) QKD is commercially available.
It has been shown very recently that its secret key rate scales quadratically with the channel transmittance.
We study various countermeasures to foil zero-error attacks against COW-QKD.
arXiv Detail & Related papers (2021-08-27T17:01:14Z) - Round-robin differential phase-time-shifting protocol for quantum key
distribution: theory and experiment [58.03659958248968]
Quantum key distribution (QKD) allows the establishment of common cryptographic keys among distant parties.
Recently, a QKD protocol that circumvents the need for monitoring signal disturbance, has been proposed and demonstrated in initial experiments.
We derive the security proofs of the round-robin differential phase-time-shifting protocol in the collective attack scenario.
Our results show that the RRDPTS protocol can achieve higher secret key rate in comparison with the RRDPS, in the condition of high quantum bit error rate.
arXiv Detail & Related papers (2021-03-15T15:20:09Z) - A new method controlling the error probability for detecting the
photon-number-splitting attack in the decoy-state quantum key distribution [9.081501177870487]
In this paper, under the null hypothesis of no PNS attack, we first determine whether there is an attack or not.
If the result is judged to be an attack, we can use the existing decoy-state method and the GLLP formula to estimate secure key rate.
Otherwise, all pulses received including both single-photon pulses and multiphoton pulses, can be used to generate the keys.
arXiv Detail & Related papers (2020-12-21T14:38:09Z) - Experimental composable security decoy-state quantum key distribution
using time-phase encoding [19.037123608278602]
We provide the rigorous finite-key security bounds for four-intensity decoy-state BB84 QKD against coherent attacks.
We build a time-phase encoding system with 200 MHz clocked to implement this protocol, in which the real-time secret key rate is more than 60 kbps over 50 km single-mode fiber.
arXiv Detail & Related papers (2020-02-25T04:59:43Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.