Non-Gaussianity and security of entanglement-based QKD
- URL: http://arxiv.org/abs/2511.01761v1
- Date: Mon, 03 Nov 2025 17:20:10 GMT
- Title: Non-Gaussianity and security of entanglement-based QKD
- Authors: Mariia Gumberidze, Vladyslav C. Usenko,
- Abstract summary: We theoretically analyse the relation between non-Gaussianity and security of entanglement-based quantum key distribution (QKD) protocols.<n>Our results can be useful as a pre-check for the implementation of QKD protocols.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: We theoretically analyse the relation between non-Gaussianity and security of entanglement-based quantum key distribution (QKD) protocols, namely device-independent (DI) and entanglement-based BB$84$. A similar analysis has already been made for prepare-and-measure (P\&M) protocols \cite{Lasota2017}. In addition, we consider imperfect detection with dark counts and limited efficiency. We assume a perfect source of entangled Bell states as produced by quantum-dot type sources, depolarisation in the channel and different noise statistics, namely thermal and Poissonian. We consider single-photon avalanche photodiodes (SPAD) and photon number resolving detectors (PNRD) and use their respective criteria for non-Gaussianity. The results show cross-regions for both security and non-Gaussianity, hence, the possibility to conclude about the suitability of a given channel for secret key distribution. Our results can be useful as a pre-check for the implementation of QKD protocols.
Related papers
- Feasibility of entanglement-based QKD protocols with SPDC and QD sources [0.0]
We theoretically analyze the feasibility of entanglement-based quantum key distribution (QKD) protocols.<n>We account for multiphoton emission in SPDC sources and fine-structure splitting (FSS) in QD.<n>Our findings are crucial for the practical implementation of entanglement-based QKD protocols using realistic sources and detectors.
arXiv Detail & Related papers (2025-10-23T13:13:55Z) - Secure quantum key distribution against correlated leakage source [20.01403427477703]
Quantum key distribution (QKD) provides information theoretic security based on quantum mechanics.<n>Among various source loopholes, correlations between transmitted pulses pose a significant yet underexplored security risk.<n>We propose a security analysis framework for QKD under correlations, enabling finite-key analysis for the first time.
arXiv Detail & Related papers (2025-07-15T12:23:24Z) - Loss-tolerant quantum key distribution with detection efficiency mismatch [39.58317527488534]
We establish a security proof for the loss-tolerant P&M QKD protocol that incorporates imperfections in both the source and the detectors.<n>Specifically, we demonstrate the security of this scheme when the emitted states deviate from the ideal ones.
arXiv Detail & Related papers (2024-12-12T19:01:56Z) - Characterising higher-order phase correlations in gain-switched laser sources with application to quantum key distribution [38.00713966087315]
Multi-photon emissions in laser sources represent a serious threat for the security of quantum key distribution.<n>We introduce experimental schemes to characterise the phase probability distribution of the emitted pulses.<n>We demonstrate that an optimisation task over interferometric measures suffices in determining the impact of arbitrary order correlations.
arXiv Detail & Related papers (2024-12-04T22:06:13Z) - Mitigating the source-side channel vulnerability by characterization of
photon statistics [1.3458279593461016]
Quantum key distribution (QKD) theoretically offers unconditional security.
Unfortunately, the gap between theory and practice threatens side-channel attacks on practical QKD systems.
We aim to bridge the gap between theory and practice to achieve information-theoretic security.
arXiv Detail & Related papers (2023-08-28T08:37:59Z) - Security of entanglement-based QKD with realistic parametric
down-conversion sources [0.0]
The paper analyzes security aspects of practical entanglement-based quantum key distribution (QKD)
We show that this effect does not impair the security of entanglement-based QKD systems.
arXiv Detail & Related papers (2023-07-04T17:25:26Z) - Secure Key from Quantum Discord [22.97866257572447]
We show how to make use of discord to analyze security in a specific quantum cryptography protocol.
Our method is robust against imperfections in qubit sources and qubit measurements as well as basis misalignment due to quantum channels.
arXiv Detail & Related papers (2023-04-12T14:21:49Z) - Phase-Matching Quantum Key Distribution without Intensity Modulation [25.004151934190965]
We propose a phase-matching quantum key distribution protocol without intensity modulation.
Simulation results show that the transmission distance of our protocol could reach 305 km in telecommunication fiber.
Our protocol provides a promising solution for constructing quantum networks.
arXiv Detail & Related papers (2023-03-21T04:32:01Z) - Quantum Chernoff divergence in advantage distillation for quantum key distribution and device-independent quantum key distribution [0.0]
Device-independent quantum key distribution (DIQKD) aims to mitigate adversarial exploitation of imperfections in quantum devices.<n>We present an alternative proof structure that replaces the fidelity with the quantum Chernoff divergence.<n>Our results provide insight into a fundamental question in quantum information theory regarding the circumstances under which DIQKD is possible.
arXiv Detail & Related papers (2022-12-14T01:44:23Z) - Efficient room-temperature molecular single-photon sources for quantum
key distribution [51.56795970800138]
Quantum Key Distribution (QKD) allows the distribution of cryptographic keys between multiple users in an information-theoretic secure way.
We introduce and demonstrate a proof-of-concept QKD system exploiting a molecule-based single-photon source operating at room temperature and emitting at 785nm.
arXiv Detail & Related papers (2022-02-25T11:52:10Z) - Finite-key analysis for quantum key distribution with discrete phase
randomization [21.561489948824274]
We develop a technique based on conjugate measurement and quantum state distinguishment to ana-lyze the security.
Our result shows that TF-QKD with reasonable number of discrete random phases, e.g. 8 phases from 0, pi/4, pi/2,..., 7pi/4, can achieve satisfactory performance.
arXiv Detail & Related papers (2022-01-09T15:45:44Z) - Security bounds for decoy-state QKD with arbitrary photon-number
statistics [0.0]
The decoy-state method is a standard enhancement to quantum key distribution (QKD) protocols.
We provide security bounds for decoy-state QKD using a source with an arbitrary photon emission statistic.
We numerically evaluate the performance of the bounds, comparing three realistic statistical distributions.
arXiv Detail & Related papers (2021-09-28T15:59:49Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.