System design and realisation towards optimising secure key bits in free space QKD
- URL: http://arxiv.org/abs/2508.10458v1
- Date: Thu, 14 Aug 2025 08:57:59 GMT
- Title: System design and realisation towards optimising secure key bits in free space QKD
- Authors: Pooja Chandravanshi, Jayanth Ramakrishnan, Tanya Sharma, Ayan Biswas, Ravindra P. Singh,
- Abstract summary: Quantum Key Distribution (QKD) is rapidly transitioning from cutting-edge laboratory research to real-world deployment in established communication networks.<n>We present a practical and systematic framework for implementing QKD, focused on the BB84 protocol.<n>We outline a simple algorithm for key sifting that is easily implementable in hardware.
- Score: 1.3458279593461016
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Quantum Key Distribution (QKD) is rapidly transitioning from cutting-edge laboratory research to real-world deployment in established communication networks. Although QKD promises future-proof security, practical challenges stil exist due to imperfections in physical devices. Many protocols offer strong security guarantees, but their implementation can be complex and difficult. To bridge this gap, we present a practical and systematic framework for implementing QKD, focused on the BB84 protocol but designed with broader applicability in mind. The article includes key concepts for device calibration, synchronisation,optical alignment, and key post-processing. We outline a simple algorithm for key sifting that is easily implementable in hardware. Our results highlight the importance of selecting the temporal window to optimise both the key rate and the quantum bit error rate (QBER). In addition, we show that random sampling of the sifted key bits for error estimation yields more reliable results than sequential sampling. We also integrate the Entrapped Pulse Coincidence Detection (EPCD) protocol to boost key generation rates, further enhancing performance. Although our work focuses on BB84, the techniques and practices outlined are general enough to support a wide range of QKD protocols. This makes our framework a valuable tool for both research and real-world deployment of secure quantum communication systems.
Related papers
- Strengthening security and noise resistance in one-way quantum key distribution protocols through hypercube-based quantum walks [18.58925264895002]
Quantum Key Distribution (QKD) is a cryptographic protocol that ensures information-theoretic security.<n>Recent research has explored the use of discrete-time Quantum Walks (QWs) to enhance QKD schemes.
arXiv Detail & Related papers (2026-02-26T17:35:53Z) - Quantum Key Distribution with Imperfections: Recent Advances in Security Proofs [0.0]
Quantum Key Distribution (QKD) can enable two spatially separated parties to establish an information-theoretically secure encryption.<n>Security proofs robust against a wide range of eavesdropping strategies have established the theoretical soundness of several QKD protocols.<n>Most proofs are based on idealized models of the physical systems involved in such protocols and often include assumptions that are not satisfied in practical implementations.
arXiv Detail & Related papers (2026-02-04T21:16:33Z) - An introductory review of the theory of continuous-variable quantum key distribution: Fundamentals, protocols, and security [35.18016233072556]
Continuous-variable quantum key distribution (CV-QKD) has emerged as a promising approach for secure quantum communication.<n>CV-QKD offers advantages such as high key generation rates, compatibility with standard telecommunication infrastructure, and potential for integration on photonic chips.<n>This review provides an accessible introduction to the theory of CV-QKD, aimed at researchers entering this rapidly developing field.
arXiv Detail & Related papers (2025-12-01T15:03:19Z) - Quantum Key Distribution: Bridging Theoretical Security Proofs, Practical Attacks, and Error Correction for Quantum-Augmented Networks [0.0]
Quantum Key Distribution (QKD) is revolutionizing cryptography by promising information-theoretic security through the immutable laws of quantum mechanics.<n>Yet, the challenge of transforming idealized security models into practical, resilient systems remains a pressing issue.<n>This review critically dissects and synthesizes the latest advancements in QKD protocols and their security vulnerabilities.
arXiv Detail & Related papers (2025-11-25T18:31:02Z) - A Fully Device-Independent Ternary Quantum Key Distribution Protocol Based on the Impossible Colouring Game [0.59374762912328]
We propose a quantum key distribution protocol based on the two-party Impossible Colouring pseudo-telepathy game.<n>The protocol harnesses Bell inequality violations that arise from contextuality in the Kochen-Specker theorem.<n>It operates within an adequate security framework and demonstrates an improved key generation rate compared to standard quantum key distribution schemes.
arXiv Detail & Related papers (2025-05-21T14:52:31Z) - High-Fidelity Coherent-One-Way QKD Simulation Framework for 6G Networks: Bridging Theory and Reality [105.73011353120471]
Quantum key distribution (QKD) has been emerged as a promising solution for guaranteeing information-theoretic security.<n>Due to the considerable high-cost of QKD equipment, a lack of QKD communication system design tools is challenging.<n>This paper introduces a QKD communication system design tool.
arXiv Detail & Related papers (2025-01-21T11:03:59Z) - Practical hybrid PQC-QKD protocols with enhanced security and performance [44.8840598334124]
We develop hybrid protocols by which QKD and PQC inter-operate within a joint quantum-classical network.
In particular, we consider different hybrid designs that may offer enhanced speed and/or security over the individual performance of either approach.
arXiv Detail & Related papers (2024-11-02T00:02:01Z) - Towards efficient and secure quantum-classical communication networks [47.27205216718476]
There are two primary approaches to achieving quantum-resistant security: quantum key distribution (QKD) and post-quantum cryptography (PQC)
We introduce the pros and cons of these protocols and explore how they can be combined to achieve a higher level of security and/or improved performance in key distribution.
We hope our discussion inspires further research into the design of hybrid cryptographic protocols for quantum-classical communication networks.
arXiv Detail & Related papers (2024-11-01T23:36:19Z) - Practical quantum secure direct communication with squeezed states [37.69303106863453]
We report the first table-top experimental demonstration of a CV-QSDC system and assess its security.<n>This realization paves the way into future threat-less quantum metropolitan networks, compatible with coexisting advanced wavelength division multiplexing (WDM) systems.
arXiv Detail & Related papers (2023-06-25T19:23:42Z) - Robust and efficient verification of graph states in blind
measurement-based quantum computation [52.70359447203418]
Blind quantum computation (BQC) is a secure quantum computation method that protects the privacy of clients.
It is crucial to verify whether the resource graph states are accurately prepared in the adversarial scenario.
Here, we propose a robust and efficient protocol for verifying arbitrary graph states with any prime local dimension.
arXiv Detail & Related papers (2023-05-18T06:24:45Z) - Improved coherent one-way quantum key distribution for high-loss
channels [0.0]
We present a simple variant of COW-QKD and prove its security in the infinite-key limit.
Remarkably, the resulting key rate of our protocol is comparable with both the existing upper-bound on COW-QKD key rate and the secure key rate of the coherent-state BB84 protocol.
arXiv Detail & Related papers (2022-06-17T00:07:03Z) - Unbalanced-basis-misalignment tolerant measurement-device-independent
quantum key distribution [22.419105320267523]
Measurement-device-independent quantum key distribution (MDIQKD) is a revolutionary protocol since it is physically immune to all attacks on the detection side.
Some protocols release part of the assumptions in the encoding system to keep the practical security, but the performance would be dramatically reduced.
We present a MDIQKD protocol that requires less knowledge of encoding system to combat the troublesome modulation errors and fluctuations.
arXiv Detail & Related papers (2021-08-27T02:16:20Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.