Secure quantum key distribution against correlated leakage source
- URL: http://arxiv.org/abs/2507.11251v1
- Date: Tue, 15 Jul 2025 12:23:24 GMT
- Title: Secure quantum key distribution against correlated leakage source
- Authors: Jia-Xuan Li, Yang-Guang Shan, Rong Wang, Feng-Yu Lu, Zhen-Qiang Yin, Shuang Wang, Wei Chen, De-Yong He, Guang-Can Guo, Zheng-Fu Han,
- Abstract summary: Quantum key distribution (QKD) provides information theoretic security based on quantum mechanics.<n>Among various source loopholes, correlations between transmitted pulses pose a significant yet underexplored security risk.<n>We propose a security analysis framework for QKD under correlations, enabling finite-key analysis for the first time.
- Score: 20.01403427477703
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Quantum key distribution (QKD) provides information theoretic security based on quantum mechanics, however, its practical deployment is challenged by imperfections of source devices. Among various source loopholes, correlations between transmitted pulses pose a significant yet underexplored security risk, potentially compromising QKD's theoretical guarantees. In this work, we propose a security analysis framework for QKD under correlations, enabling finite-key analysis for the first time by extending and rearranging QKD rounds and leveraging the generalized chain rule. Based on this framework, and inspired by the idea of side-channel-secure QKD, we develop a secure QKD against correlated leakage source only need the characterization of correlation range and the lower bound on the vacuum component of the prepared states. Additionally, our framework can be extended to other QKD protocols, offering a general approach to consider correlation induced security vulnerabilities. The simulation results demonstrate the effectiveness of our protocol and its significantly superior tolerance to imperfect parameters compared to existing protocols. This work provides a crucial step toward closing security loopholes in QKD, enhancing its practicality, and ensuring long-distance,high-performance secure communication under real-world constraints.
Related papers
- Secure One-Sided Device-Independent Quantum Key Distribution Under Collective Attacks with Enhanced Robustness [0.0]
We study the security of a quantum key distribution protocol under the one-sided device-independent (1sDI) setting.<n>We show that the protocol tolerates higher quantum bit error rates (QBER) than present DI-QKD protocols.
arXiv Detail & Related papers (2025-07-24T18:47:04Z) - High-Fidelity Coherent-One-Way QKD Simulation Framework for 6G Networks: Bridging Theory and Reality [105.73011353120471]
Quantum key distribution (QKD) has been emerged as a promising solution for guaranteeing information-theoretic security.<n>Due to the considerable high-cost of QKD equipment, a lack of QKD communication system design tools is challenging.<n>This paper introduces a QKD communication system design tool.
arXiv Detail & Related papers (2025-01-21T11:03:59Z) - Practical hybrid PQC-QKD protocols with enhanced security and performance [44.8840598334124]
We develop hybrid protocols by which QKD and PQC inter-operate within a joint quantum-classical network.
In particular, we consider different hybrid designs that may offer enhanced speed and/or security over the individual performance of either approach.
arXiv Detail & Related papers (2024-11-02T00:02:01Z) - Empirical Risk-aware Machine Learning on Trojan-Horse Detection for Trusted Quantum Key Distribution Networks [31.857236131842843]
Quantum key distribution (QKD) is a cryptographic technique that offers high levels of data security during transmission.
The existence of a gap between theoretical concepts and practical implementation has raised concerns about the trustworthiness of QKD networks.
We propose the implementation of risk-aware machine learning techniques that present risk analysis for Trojan-horse attacks over the time-variant quantum channel.
arXiv Detail & Related papers (2024-01-26T03:36:13Z) - Finite-Key Analysis for Coherent One-Way Quantum Key Distribution [18.15943439545963]
Coherent-one-way (COW) quantum key distribution (QKD) is a significant communication protocol that has been implemented experimentally and deployed in practical products.
Existing security analyses of COW-QKD either provide a short transmission distance or lack immunity against coherent attacks in the finite-key regime.
We present a tight finite-key framework for a variant of COW-QKD, which has been proven to extend the secure transmission distance in the case.
arXiv Detail & Related papers (2023-09-28T03:32:06Z) - Practical quantum secure direct communication with squeezed states [37.69303106863453]
We report the first table-top experimental demonstration of a CV-QSDC system and assess its security.<n>This realization paves the way into future threat-less quantum metropolitan networks, compatible with coexisting advanced wavelength division multiplexing (WDM) systems.
arXiv Detail & Related papers (2023-06-25T19:23:42Z) - Experimental quantum secret sharing based on phase encoding of coherent
states [17.01107355316032]
We propose a quantum secret sharing protocol with simple phase encoding of coherent states among three parties.
Our scheme achieves a key rate of 85.3 bps under a 35 dB channel loss.
arXiv Detail & Related papers (2023-03-26T04:35:07Z) - QKD Based on Time-Entangled Photons and its Key-Rate Promise [24.07745562101555]
Time-entanglement-based QKD promises to increase the secret key rate and distribution compared to other QKD implementations.
We overview state-of-the-art from the information and coding theory perspective.
arXiv Detail & Related papers (2023-03-03T14:40:40Z) - Improved coherent one-way quantum key distribution for high-loss
channels [0.0]
We present a simple variant of COW-QKD and prove its security in the infinite-key limit.
Remarkably, the resulting key rate of our protocol is comparable with both the existing upper-bound on COW-QKD key rate and the secure key rate of the coherent-state BB84 protocol.
arXiv Detail & Related papers (2022-06-17T00:07:03Z) - Experimental measurement-device-independent type quantum key
distribution with flawed and correlated sources [14.143874849657317]
Security of quantum key distribution (QKD) is threatened by discrepancies between realistic devices and theoretical assumptions.
Here, we adopt the reference technique to prove security of an efficient four-phase measurement-device-independent QKD using laser pulses against potential source imperfections.
In addition, we demonstrate the feasibility of our protocol through a proof-of-principle experimental implementation and achieve a secure key rate of 253 bps with a 20 dB channel loss.
arXiv Detail & Related papers (2022-04-18T13:44:51Z) - Twin-field quantum key distribution with passive-decoy state [22.26373392802507]
We propose passive-decoy based TF-QKD, in which we combine TF-QKD with the passive-decoy method.
We present a simulation comparing the key generation rate with that in active-decoy, the result shows our scheme performs as good as active decoy TF-QKD.
arXiv Detail & Related papers (2020-11-15T04:02:48Z) - Quantum key distribution with correlated sources [1.7499351967216341]
In theory, quantum key distribution (QKD) offers information-theoretic security.
In practice, however, it does not due to discrepancies between the assumptions used in the security proofs and the behaviour of the real apparatuses.
Here, we close this gap by introducing a simple yet general method to prove the security of QKD with arbitrarily long-range pulse correlations.
arXiv Detail & Related papers (2019-08-22T09:05:17Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.