Finite-correlation-secure quantum key distribution
- URL: http://arxiv.org/abs/2507.11243v1
- Date: Tue, 15 Jul 2025 12:17:08 GMT
- Title: Finite-correlation-secure quantum key distribution
- Authors: Yang-Guang Shan, Jia-Xuan Li, Zhen-Qiang Yin, Shuang Wang, Wei Chen, De-Yong He, Guang-Can Guo, Zheng-Fu Han,
- Abstract summary: Correlation between different pulses is a nettlesome problem in quantum key distribution (QKD)<n>We propose a new protocol immune to all correlations of all dimensions, with the only requirements of non-entangled and finite-ranged correlation, and bounded vacuum probability.<n>We provide the finite-key security analysis against coherent attacks and conduct numerical simulations to see the performance.
- Score: 6.781525278813814
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Correlation between different pulses is a nettlesome problem in quantum key distribution (QKD). All existing solutions for this problem need to characterize the strength of the correlation, which may reduce the security of QKD to an accurate characterization. In this article, we propose a new protocol immune to all correlations of all dimensions, with the only requirements of non-entangled and finite-ranged correlation, and bounded vacuum probability. Additionally, the new protocol is side-channel-secure and measurement-device-independent, giving high-level security in practical QKD systems. We provide the finite-key security analysis against coherent attacks and conduct numerical simulations to see the performance. The result shows that a small correlation range does not influence the performance a lot and the protocol could tolerate a large correlation range, such as correlations spanning over 500 pulses.
Related papers
- Secure One-Sided Device-Independent Quantum Key Distribution Under Collective Attacks with Enhanced Robustness [0.0]
We study the security of a quantum key distribution protocol under the one-sided device-independent (1sDI) setting.<n>We show that the protocol tolerates higher quantum bit error rates (QBER) than present DI-QKD protocols.
arXiv Detail & Related papers (2025-07-24T18:47:04Z) - Secure quantum key distribution against correlated leakage source [20.01403427477703]
Quantum key distribution (QKD) provides information theoretic security based on quantum mechanics.<n>Among various source loopholes, correlations between transmitted pulses pose a significant yet underexplored security risk.<n>We propose a security analysis framework for QKD under correlations, enabling finite-key analysis for the first time.
arXiv Detail & Related papers (2025-07-15T12:23:24Z) - Modeling and Characterization of Arbitrary Order Pulse Correlations for Quantum Key Distribution [0.31410859223862103]
We introduce a simple linear model to explain pulse correlations.<n>We experimentally characterize short-range correlations and apply the proposed method to account for long-range correlations to an infinite order.
arXiv Detail & Related papers (2025-06-23T14:26:53Z) - Device-independent secure correlations in sequential quantum scenarios [44.99833362998488]
Device-independent quantum information is attracting significant attention, particularly for its applications in information security.<n>We propose a systematic approach to designing sequential quantum protocols for device-independent security.<n>We analytically prove that, with this systematic construction, the resulting ideal correlations are secure in the sense that they cannot be reproduced as a statistical mixture of other correlations.
arXiv Detail & Related papers (2025-03-18T16:45:20Z) - Characterising higher-order phase correlations in gain-switched laser sources with application to quantum key distribution [38.00713966087315]
Multi-photon emissions in laser sources represent a serious threat for the security of quantum key distribution.<n>We introduce experimental schemes to characterise the phase probability distribution of the emitted pulses.<n>We demonstrate that an optimisation task over interferometric measures suffices in determining the impact of arbitrary order correlations.
arXiv Detail & Related papers (2024-12-04T22:06:13Z) - Practical hybrid PQC-QKD protocols with enhanced security and performance [44.8840598334124]
We develop hybrid protocols by which QKD and PQC inter-operate within a joint quantum-classical network.
In particular, we consider different hybrid designs that may offer enhanced speed and/or security over the individual performance of either approach.
arXiv Detail & Related papers (2024-11-02T00:02:01Z) - Quantum key distribution with unbounded pulse correlations [0.0]
A prevalent issue in practical applications of quantum key distribution (QKD) is the emergence of correlations among the emitted signals.
We introduce a general formalism designed to extend existing security proofs to the practically relevant scenario.
This approach significantly enhances the applicability of these proofs and the robustness of QKD's implementation security.
arXiv Detail & Related papers (2024-02-12T19:43:46Z) - Correcting for finite statistics effects in a quantum steering experiment [33.013102271622614]
We introduce a one-sided device-independent protocol that corrects for apparent signaling effects in experimental probability distributions.<n>Our results show a significantly higher probability of violation than existing state-of-the-art inequalities.<n>This work demonstrates the power of semidefinite programming for entanglement verification and brings quantum networks closer to practical applications.
arXiv Detail & Related papers (2023-05-23T14:39:08Z) - Phase-Matching Quantum Key Distribution without Intensity Modulation [25.004151934190965]
We propose a phase-matching quantum key distribution protocol without intensity modulation.
Simulation results show that the transmission distance of our protocol could reach 305 km in telecommunication fiber.
Our protocol provides a promising solution for constructing quantum networks.
arXiv Detail & Related papers (2023-03-21T04:32:01Z) - Data post-processing for the one-way heterodyne protocol under
composable finite-size security [62.997667081978825]
We study the performance of a practical continuous-variable (CV) quantum key distribution protocol.
We focus on the Gaussian-modulated coherent-state protocol with heterodyne detection in a high signal-to-noise ratio regime.
This allows us to study the performance for practical implementations of the protocol and optimize the parameters connected to the steps above.
arXiv Detail & Related papers (2022-05-20T12:37:09Z) - Experimental measurement-device-independent type quantum key
distribution with flawed and correlated sources [14.143874849657317]
Security of quantum key distribution (QKD) is threatened by discrepancies between realistic devices and theoretical assumptions.
Here, we adopt the reference technique to prove security of an efficient four-phase measurement-device-independent QKD using laser pulses against potential source imperfections.
In addition, we demonstrate the feasibility of our protocol through a proof-of-principle experimental implementation and achieve a secure key rate of 253 bps with a 20 dB channel loss.
arXiv Detail & Related papers (2022-04-18T13:44:51Z) - Composably secure data processing for Gaussian-modulated continuous
variable quantum key distribution [58.720142291102135]
Continuous-variable quantum key distribution (QKD) employs the quadratures of a bosonic mode to establish a secret key between two remote parties.
We consider a protocol with homodyne detection in the general setting of composable finite-size security.
In particular, we analyze the high signal-to-noise regime which requires the use of high-rate (non-binary) low-density parity check codes.
arXiv Detail & Related papers (2021-03-30T18:02:55Z) - Round-robin differential phase-time-shifting protocol for quantum key
distribution: theory and experiment [58.03659958248968]
Quantum key distribution (QKD) allows the establishment of common cryptographic keys among distant parties.
Recently, a QKD protocol that circumvents the need for monitoring signal disturbance, has been proposed and demonstrated in initial experiments.
We derive the security proofs of the round-robin differential phase-time-shifting protocol in the collective attack scenario.
Our results show that the RRDPTS protocol can achieve higher secret key rate in comparison with the RRDPS, in the condition of high quantum bit error rate.
arXiv Detail & Related papers (2021-03-15T15:20:09Z) - Efficient decoy-states for the reference-frame-independent
measurement-device-independent quantum key distribution [22.452971995801686]
RFI-MDI-QKD eliminates all possible attacks on detector side and necessity of reference-frame alignment in source sides.
The performance of RFI-MDI-QKD is greatly improved in terms of secret key rate and achievable distance when statistical fluctuations are considered.
arXiv Detail & Related papers (2020-02-10T11:52:53Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.