Security of quantum key distribution with source and detector imperfections through phase-error estimation
- URL: http://arxiv.org/abs/2507.03549v1
- Date: Fri, 04 Jul 2025 12:58:12 GMT
- Title: Security of quantum key distribution with source and detector imperfections through phase-error estimation
- Authors: Guillermo CurrĂ¡s-Lorenzo, Margarida Pereira, Shlok Nahar, Devashish Tupkary,
- Abstract summary: Quantum key distribution (QKD) promises information-theoretic security based on quantum mechanics, but practical implementations face security vulnerabilities due to device imperfections.<n>Recent advances have separately addressed source and detector imperfections in phase-error-estimation based security proof frameworks.<n>We show that existing techniques for BB84-type protocols can be combined to construct a unified security proof that simultaneously accounts for both source and detector imperfections.
- Score: 0.3749861135832072
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Quantum key distribution (QKD) promises information-theoretic security based on quantum mechanics, but practical implementations face security vulnerabilities due to device imperfections. Recent advances have separately addressed source and detector imperfections in phase-error-estimation based security proof frameworks, but this is not enough to protect real-world QKD systems suffering from both types of imperfections simultaneously. In this work, we show that existing techniques for BB84-type protocols can be combined to construct a unified security proof that simultaneously accounts for both source and detector imperfections. Our approach thus represents a significant step towards closing the gap between theoretical security proofs and practical QKD implementations.
Related papers
- High-Fidelity Coherent-One-Way QKD Simulation Framework for 6G Networks: Bridging Theory and Reality [105.73011353120471]
Quantum key distribution (QKD) has been emerged as a promising solution for guaranteeing information-theoretic security.<n>Due to the considerable high-cost of QKD equipment, a lack of QKD communication system design tools is challenging.<n>This paper introduces a QKD communication system design tool.
arXiv Detail & Related papers (2025-01-21T11:03:59Z) - Loss-tolerant quantum key distribution with detection efficiency mismatch [39.58317527488534]
We establish a security proof for the loss-tolerant P&M QKD protocol that incorporates imperfections in both the source and the detectors.<n>Specifically, we demonstrate the security of this scheme when the emitted states deviate from the ideal ones.
arXiv Detail & Related papers (2024-12-12T19:01:56Z) - Quantum Key Distribution with Basis-Dependent Detection Probability [0.0]
A common assumption in security proofs is that the detection probability at the receiver, for a given input state, is independent of the measurement basis.<n>This paper presents a security proof for QKD protocols that does not rely on the above assumption.<n>We demonstrate, through simulations, that our proof can extract positive key rates for setups vulnerable to large detection probability mismatches.
arXiv Detail & Related papers (2024-11-29T17:35:27Z) - Practical hybrid PQC-QKD protocols with enhanced security and performance [44.8840598334124]
We develop hybrid protocols by which QKD and PQC inter-operate within a joint quantum-classical network.
In particular, we consider different hybrid designs that may offer enhanced speed and/or security over the individual performance of either approach.
arXiv Detail & Related papers (2024-11-02T00:02:01Z) - Empirical Risk-aware Machine Learning on Trojan-Horse Detection for Trusted Quantum Key Distribution Networks [31.857236131842843]
Quantum key distribution (QKD) is a cryptographic technique that offers high levels of data security during transmission.
The existence of a gap between theoretical concepts and practical implementation has raised concerns about the trustworthiness of QKD networks.
We propose the implementation of risk-aware machine learning techniques that present risk analysis for Trojan-horse attacks over the time-variant quantum channel.
arXiv Detail & Related papers (2024-01-26T03:36:13Z) - Security of high-speed quantum key distribution with imperfect sources [1.2815904071470707]
Imperfect encoders compromise the security of quantum key distribution (QKD) systems via modulation flaws, side channels and inter-pulse correlations.<n>Here, we present a finite-key security proof approach against coherent attacks that incorporates general encoding imperfections while achieving significantly better performances and requiring only partial characterization.
arXiv Detail & Related papers (2023-05-10T07:02:32Z) - Experimental quantum secret sharing based on phase encoding of coherent
states [17.01107355316032]
We propose a quantum secret sharing protocol with simple phase encoding of coherent states among three parties.
Our scheme achieves a key rate of 85.3 bps under a 35 dB channel loss.
arXiv Detail & Related papers (2023-03-26T04:35:07Z) - Experimental measurement-device-independent type quantum key
distribution with flawed and correlated sources [14.143874849657317]
Security of quantum key distribution (QKD) is threatened by discrepancies between realistic devices and theoretical assumptions.
Here, we adopt the reference technique to prove security of an efficient four-phase measurement-device-independent QKD using laser pulses against potential source imperfections.
In addition, we demonstrate the feasibility of our protocol through a proof-of-principle experimental implementation and achieve a secure key rate of 253 bps with a 20 dB channel loss.
arXiv Detail & Related papers (2022-04-18T13:44:51Z) - Quantum Proofs of Deletion for Learning with Errors [91.3755431537592]
We construct the first fully homomorphic encryption scheme with certified deletion.
Our main technical ingredient is an interactive protocol by which a quantum prover can convince a classical verifier that a sample from the Learning with Errors distribution in the form of a quantum state was deleted.
arXiv Detail & Related papers (2022-03-03T10:07:32Z) - Backflash Light as a Security Vulnerability in Quantum Key Distribution
Systems [77.34726150561087]
We review the security vulnerabilities of quantum key distribution (QKD) systems.
We mainly focus on a particular effect known as backflash light, which can be a source of eavesdropping attacks.
arXiv Detail & Related papers (2020-03-23T18:23:12Z) - Quantum key distribution with correlated sources [1.7499351967216341]
In theory, quantum key distribution (QKD) offers information-theoretic security.
In practice, however, it does not due to discrepancies between the assumptions used in the security proofs and the behaviour of the real apparatuses.
Here, we close this gap by introducing a simple yet general method to prove the security of QKD with arbitrarily long-range pulse correlations.
arXiv Detail & Related papers (2019-08-22T09:05:17Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.