Continuous-Variable Quantum Key Distribution with Composable Security and Tight Error Correction Bound for Constrained Devices
- URL: http://arxiv.org/abs/2504.06384v1
- Date: Tue, 08 Apr 2025 19:08:08 GMT
- Title: Continuous-Variable Quantum Key Distribution with Composable Security and Tight Error Correction Bound for Constrained Devices
- Authors: Panagiotis Papanastasiou, Carlo Ottaviani, Stefano Pirandola, Poonam Yadav, Marco Lucamarini,
- Abstract summary: Constrained devices, such as smart sensors, wearable devices, and Internet of Things nodes, rely on secure communications to function properly.<n>CV-QKD offers the highest secure key rate and the greatest versatility for integration into existing infrastructure.
- Score: 1.726266255043611
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Constrained devices, such as smart sensors, wearable devices, and Internet of Things nodes, are increasingly prevalent in society and rely on secure communications to function properly. These devices often operate autonomously, exchanging sensitive data or commands over short distances, such as within a room, house, or warehouse. In this context, continuous-variable quantum key distribution (CV-QKD) offers the highest secure key rate and the greatest versatility for integration into existing infrastructure. A key challenge in this setting, where devices have limited storage and processing capacity, is obtaining a realistic and tight estimate of the CV-QKD secure key rate within a composable security framework, with error correction (EC) consuming most of the storage and computational power. To address this, we focus on low-density parity-check (LDPC) codes with non-binary alphabets, which optimise mutual information and are particularly suited for short-distance communications. We develop a security framework to derive finite-size secret keys near the optimal EC leakage limit and model the related memory requirements for the encoding process in one-way error correction. This analysis facilitates the practical deployment of CV-QKD, particularly in constrained devices with limited storage and computational resources.
Related papers
- PLS-Assisted Offloading for Edge Computing-Enabled Post-Quantum Security in Resource-Constrained Devices [13.649969611527746]
Post-quantum cryptography (PQC) standards have become imperative for resource-constrained devices (RCDs) in the Internet of Things (IoT)
We propose an edge computing-enabled PQC framework that leverages a physical-layer security (PLS)-assisted offloading strategy.
Our framework integrates two PLS techniques: offloading RCDs employ wiretap coding to secure data transmission, while non-offloading RCDs serve as friendly jammers by broadcasting artificial noise.
arXiv Detail & Related papers (2025-04-13T05:14:17Z) - Privacy Enhanced QKD Networks: Zero Trust Relay Architecture based on Homomorphic Encryption [0.0]
Quantum key distribution (QKD) enables unconditionally secure symmetric key exchange between parties.<n>Traditional solutions rely on trusted relay nodes, which perform intermediate re-encryption of keys using one-time pad (OTP) encryption.<n>We propose a zero-trust relay design that applies fully homomorphic encryption (FHE) to perform intermediate OTP re-encryption.
arXiv Detail & Related papers (2025-03-21T10:20:06Z) - Application of $α$-order Information Metrics for Secure Communication in Quantum Physical Layer Design [45.41082277680607]
We study the $alpha$-order information-theoretic metrics based on R'enyi entropy.<n>We apply our framework to a practical scenario involving BPSK modulation over a lossy bosonic channel.
arXiv Detail & Related papers (2025-02-07T03:44:11Z) - Securing Legacy Communication Networks via Authenticated Cyclic Redundancy Integrity Check [98.34702864029796]
We propose Authenticated Cyclic Redundancy Integrity Check (ACRIC)
ACRIC preserves backward compatibility without requiring additional hardware and is protocol agnostic.
We show that ACRIC offers robust security with minimal transmission overhead ( 1 ms)
arXiv Detail & Related papers (2024-11-21T18:26:05Z) - Practical hybrid PQC-QKD protocols with enhanced security and performance [44.8840598334124]
We develop hybrid protocols by which QKD and PQC inter-operate within a joint quantum-classical network.
In particular, we consider different hybrid designs that may offer enhanced speed and/or security over the individual performance of either approach.
arXiv Detail & Related papers (2024-11-02T00:02:01Z) - Coding-Based Hybrid Post-Quantum Cryptosystem for Non-Uniform Information [53.85237314348328]
We introduce for non-uniform messages a novel hybrid universal network coding cryptosystem (NU-HUNCC)
We show that NU-HUNCC is information-theoretic individually secured against an eavesdropper with access to any subset of the links.
arXiv Detail & Related papers (2024-02-13T12:12:39Z) - SOCI^+: An Enhanced Toolkit for Secure OutsourcedComputation on Integers [50.608828039206365]
We propose SOCI+ which significantly improves the performance of SOCI.
SOCI+ employs a novel (2, 2)-threshold Paillier cryptosystem with fast encryption and decryption as its cryptographic primitive.
Compared with SOCI, our experimental evaluation shows that SOCI+ is up to 5.4 times more efficient in computation and 40% less in communication overhead.
arXiv Detail & Related papers (2023-09-27T05:19:32Z) - Practical quantum secure direct communication with squeezed states [55.41644538483948]
We report the first table-top experimental demonstration of a CV-QSDC system and assess its security.
This realization paves the way into future threat-less quantum metropolitan networks, compatible with coexisting advanced wavelength division multiplexing (WDM) systems.
arXiv Detail & Related papers (2023-06-25T19:23:42Z) - A security framework for quantum key distribution implementations [1.2815904071470707]
We present a security proof in the finite-key regime against coherent attacks.
Our proof requires minimal state characterization, which facilitates its application to real-life implementations.
arXiv Detail & Related papers (2023-05-10T07:02:32Z) - Modulation leakage-free continuous-variable quantum key distribution [1.8268488712787332]
Continuous-variable (CV) QKD based on coherent states is an attractive scheme for secure communication.
This work is a step towards protecting CVQKD systems against practical imperfections of physical devices and operational limitations without performance degradation.
arXiv Detail & Related papers (2022-05-15T10:07:19Z) - Composable security for continuous variable quantum key distribution:
Trust levels and practical key rates in wired and wireless networks [0.0]
Continuous variable (CV) quantum key distribution (QKD) provides a powerful setting for secure quantum communications.
We study the composable finite-size security of CV-QKD with Gaussian-modulated coherent-state protocols.
We show that high key rates are achievable for short-range optical wireless (LiFi) in secure quantum networks with both fixed and mobile devices.
arXiv Detail & Related papers (2022-03-01T19:04:43Z) - Composably secure data processing for Gaussian-modulated continuous
variable quantum key distribution [58.720142291102135]
Continuous-variable quantum key distribution (QKD) employs the quadratures of a bosonic mode to establish a secret key between two remote parties.
We consider a protocol with homodyne detection in the general setting of composable finite-size security.
In particular, we analyze the high signal-to-noise regime which requires the use of high-rate (non-binary) low-density parity check codes.
arXiv Detail & Related papers (2021-03-30T18:02:55Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.