Realistic Threat Models for Fiber and Free-Space Continuous-Variable Quantum Key Distribution
- URL: http://arxiv.org/abs/2510.06971v1
- Date: Wed, 08 Oct 2025 12:57:15 GMT
- Title: Realistic Threat Models for Fiber and Free-Space Continuous-Variable Quantum Key Distribution
- Authors: Zhiyue Zuo, Masoud Ghalaii, Stefano Pirandola,
- Abstract summary: Continuous variable quantum key distribution (QKD) provides a powerful setting for secure quantum communications.<n>The achievable performance of CV-QKD protocols is limited by the fact that they appear to be fragile to both loss and noise.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Future global quantum communication networks, or quantum Internet, will realize high-rate secure communication and entanglement distribution for large-scale users over long distances. Continuous variable (CV) quantum key distribution (QKD) provides a powerful setting for secure quantum communications, thanks to the use of room-temperature off-the-shelf optical devices and the potential to reach high rates. However, the achievable performance of CV-QKD protocols is fundamentally limited by the fact that they appear to be fragile to both loss and noise. In this study, we provide a general framework for analyzing the composable finite-size security of CV-QKD with Gaussian-modulated coherent-state protocol (GMCS) under various levels of trust for the loss and noise experienced by the users of the protocol. Our work is comprehensive of several practical scenarios, encompassing both active and passive eavesdropping configurations, with both wired (i.e., fiber-based) and wireless (i.e., free-space and satellite-based) quantum communication channels. Our numerical results evaluate the robustness of the GMCS protocol under varying levels of trust and demonstrate that it is difficult for a practical protocol to remain robust against untrusted loss at the transmitter. In the wireless case, we analyze a scenario with a sun-synchronous satellite, showing that its key distribution rate, even with the worst level of trust, can outperform a ground chain of ideal quantum repeaters. Our results indicate that, when it comes to engineering and optimizing quantum-safe networks, it is essential to mitigate the shortcomings caused by critical trade-offs between rate performance, trust level, system noise, and communication distance.
Related papers
- Multi-Agent-Driven Cognitive Secure Communications in Satellite-Terrestrial Networks [58.70163955407538]
Malicious eavesdroppers pose a serious threat to private information via satellite-terrestrial networks (STNs)<n>We propose a cognitive secure communication framework driven by multiple agents that coordinates spectrum scheduling and protection through real-time sensing.<n>We exploit generative adversarial networks to produce adversarial matrices, and employ learning-aided power control to set real and adversarial signal powers for protection layer.
arXiv Detail & Related papers (2026-01-06T10:30:41Z) - Continuous-variable Measurement Device Independent MIMO Quantum Key Distribution for THz Communications [10.446220662978272]
This paper explores a CV measurement-device-independent (MDI) QKD system operating at terahertz (THz)<n>In this system, measurement is delegated to an untrusted third party, Charlie, rather than the receiver, eliminating all detector attacks.<n>The proposed protocol offers a scalable solution for secure quantum communications in next-generation wireless networks.
arXiv Detail & Related papers (2025-11-07T06:52:28Z) - A Fully Device-Independent Ternary Quantum Key Distribution Protocol Based on the Impossible Colouring Game [0.59374762912328]
We propose a quantum key distribution protocol based on the two-party Impossible Colouring pseudo-telepathy game.<n>The protocol harnesses Bell inequality violations that arise from contextuality in the Kochen-Specker theorem.<n>It operates within an adequate security framework and demonstrates an improved key generation rate compared to standard quantum key distribution schemes.
arXiv Detail & Related papers (2025-05-21T14:52:31Z) - Application of $α$-order Information Metrics for Secure Communication in Quantum Physical Layer Design [45.41082277680607]
We study the $alpha$-order information-theoretic metrics based on R'enyi entropy.<n>We apply our framework to a practical scenario involving BPSK modulation over a lossy bosonic channel.
arXiv Detail & Related papers (2025-02-07T03:44:11Z) - Practical hybrid PQC-QKD protocols with enhanced security and performance [44.8840598334124]
We develop hybrid protocols by which QKD and PQC inter-operate within a joint quantum-classical network.
In particular, we consider different hybrid designs that may offer enhanced speed and/or security over the individual performance of either approach.
arXiv Detail & Related papers (2024-11-02T00:02:01Z) - Towards efficient and secure quantum-classical communication networks [47.27205216718476]
There are two primary approaches to achieving quantum-resistant security: quantum key distribution (QKD) and post-quantum cryptography (PQC)
We introduce the pros and cons of these protocols and explore how they can be combined to achieve a higher level of security and/or improved performance in key distribution.
We hope our discussion inspires further research into the design of hybrid cryptographic protocols for quantum-classical communication networks.
arXiv Detail & Related papers (2024-11-01T23:36:19Z) - Security Enhancement of Quantum Communication in Space-Air-Ground Integrated Networks [7.404591865944407]
Quantum teleportation achieves the transmission of quantum states through quantum channels.
We propose a practical solution that ensures secure information transmission even in the presence of errors in both classical and quantum channels.
arXiv Detail & Related papers (2024-10-22T14:27:21Z) - The Evolution of Quantum Secure Direct Communication: On the Road to the Qinternet [49.8449750761258]
Quantum secure direct communication (QSDC) is provably secure and overcomes the threat of quantum computing.<n>We will detail the associated point-to-point communication protocols and show how information is protected and transmitted.
arXiv Detail & Related papers (2023-11-23T12:40:47Z) - Practical quantum secure direct communication with squeezed states [37.69303106863453]
We report the first table-top experimental demonstration of a CV-QSDC system and assess its security.<n>This realization paves the way into future threat-less quantum metropolitan networks, compatible with coexisting advanced wavelength division multiplexing (WDM) systems.
arXiv Detail & Related papers (2023-06-25T19:23:42Z) - Long-distance continuous-variable quantum key distribution over 100 km
fiber with local local oscillator [0.6524460254566905]
Quantum key distribution (QKD) enables two remote parties to share encryption keys with security based on the laws of physics.
Here, we report a long-distance CV-QKD experiment with a locally generated local oscillator over a 100 km fiber channel with a total loss of 15.4 dB.
This record-breaking distance is achieved by controlling the phase-noise-induced excess noise through a machine-learning framework for carrier recovery and optimizing the modulation variance.
arXiv Detail & Related papers (2023-05-14T13:34:20Z) - Finite key performance of satellite quantum key distribution under
practical constraints [0.0]
Global-scale quantum communication networks will require efficient long-distance distribution of quantum signals.
Satellites enable intercontinental quantum communication by exploiting more benign inverse square free-space attenuation and long sight lines.
arXiv Detail & Related papers (2023-01-30T19:00:01Z) - Composable security for continuous variable quantum key distribution:
Trust levels and practical key rates in wired and wireless networks [0.0]
Continuous variable (CV) quantum key distribution (QKD) provides a powerful setting for secure quantum communications.
We study the composable finite-size security of CV-QKD with Gaussian-modulated coherent-state protocols.
We show that high key rates are achievable for short-range optical wireless (LiFi) in secure quantum networks with both fixed and mobile devices.
arXiv Detail & Related papers (2022-03-01T19:04:43Z) - Towards fully-fledged quantum and classical communication over deployed
fiber with up-conversion module [47.187609203210705]
We propose and demonstrate a new method, based on up-conversion assisted receiver, for co-propagating classical light and QKD signals.
Our proposal exhibits higher tolerance for noise in comparison to the standard receiver, thus enabling the distribution of secret keys in the condition of 4 dB-higher classical power.
arXiv Detail & Related papers (2021-06-09T13:52:27Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.