A rigorous and complete security proof of decoy-state BB84 quantum key distribution
- URL: http://arxiv.org/abs/2601.18035v1
- Date: Sun, 25 Jan 2026 23:15:11 GMT
- Title: A rigorous and complete security proof of decoy-state BB84 quantum key distribution
- Authors: Devashish Tupkary, Shlok Nahar, Amir Arqand, Ernest Y. -Z. Tan, Norbert Lütkenhaus,
- Abstract summary: We present a rigorous and complete security proof of the decoy-state BB84 quantum key distribution protocol.<n>This work develops a general and modular framework that can be adapted to a broad class of QKD protocols.
- Score: 0.0
- License: http://creativecommons.org/licenses/by-nc-sa/4.0/
- Abstract: We present a rigorous and complete security proof of the decoy-state BB84 quantum key distribution (QKD) protocol. Our analysis aims to achieve a high standard of mathematical rigour and completeness, thereby providing the necessary foundation for certification and standardization efforts. Beyond establishing the security of a specific protocol, this work develops a general and modular framework that can be readily adapted to a broad class of QKD protocols, including both prepare-and-measure and entanglement-based variants. Our framework unifies all major ingredients required for the analysis of realistic QKD protocols, including the analysis of classical authentication and classical processing, source-replacement schemes, finite-size analysis, source maps, squashing maps, and decoy-state techniques. In doing so, this work consolidates a diverse range of techniques scattered across the QKD literature into a unified formalism, representing a general and rigorous treatment of QKD security. Finally, it outlines a clear path towards incorporating practical imperfections within the same framework, thereby laying the groundwork for addressing implementation security in future analysis.
Related papers
- Quantum Key Distribution with Imperfections: Recent Advances in Security Proofs [0.0]
Quantum Key Distribution (QKD) can enable two spatially separated parties to establish an information-theoretically secure encryption.<n>Security proofs robust against a wide range of eavesdropping strategies have established the theoretical soundness of several QKD protocols.<n>Most proofs are based on idealized models of the physical systems involved in such protocols and often include assumptions that are not satisfied in practical implementations.
arXiv Detail & Related papers (2026-02-04T21:16:33Z) - An introductory review of the theory of continuous-variable quantum key distribution: Fundamentals, protocols, and security [35.18016233072556]
Continuous-variable quantum key distribution (CV-QKD) has emerged as a promising approach for secure quantum communication.<n>CV-QKD offers advantages such as high key generation rates, compatibility with standard telecommunication infrastructure, and potential for integration on photonic chips.<n>This review provides an accessible introduction to the theory of CV-QKD, aimed at researchers entering this rapidly developing field.
arXiv Detail & Related papers (2025-12-01T15:03:19Z) - Towards Global Quantum Key Distribution [47.07173095566302]
Quantum Key Distribution (QKD) supports the negotiation and sharing of private keys with unconditional security between authorized parties.<n>As QKD expands its reach globally, it encounters challenges such as performance limitations, cost, and practical security concerns.<n>In this review, we provide an overview of QKD implementations, with a focus on protocols, devices, and quantum channels.
arXiv Detail & Related papers (2025-11-14T06:04:48Z) - ECCentric: An Empirical Analysis of Quantum Error Correction Codes [40.10865338207471]
We introduce ECCentric, an end-to-end benchmarking framework for evaluating quantum error correction codes.<n>We conduct the first systematic benchmarking of major QEC code families against realistic, mid-term quantum device parameters.<n>Our findings suggest that trapped-ion architectures with qubit shuttling are the most promising near-term platforms.
arXiv Detail & Related papers (2025-11-02T20:01:43Z) - Secure quantum key distribution against correlated leakage source [20.01403427477703]
Quantum key distribution (QKD) provides information theoretic security based on quantum mechanics.<n>Among various source loopholes, correlations between transmitted pulses pose a significant yet underexplored security risk.<n>We propose a security analysis framework for QKD under correlations, enabling finite-key analysis for the first time.
arXiv Detail & Related papers (2025-07-15T12:23:24Z) - Rényi security framework against coherent attacks applied to decoy-state QKD [0.0]
We develop a flexible and robust framework for finite-size security proofs of quantum key distribution protocols under coherent attacks.<n>Our approach achieves high finite-size key rates across a broad class of protocols while imposing minimal requirements.
arXiv Detail & Related papers (2025-04-16T16:54:23Z) - High-Fidelity Coherent-One-Way QKD Simulation Framework for 6G Networks: Bridging Theory and Reality [105.73011353120471]
Quantum key distribution (QKD) has been emerged as a promising solution for guaranteeing information-theoretic security.<n>Due to the considerable high-cost of QKD equipment, a lack of QKD communication system design tools is challenging.<n>This paper introduces a QKD communication system design tool.
arXiv Detail & Related papers (2025-01-21T11:03:59Z) - Practical hybrid PQC-QKD protocols with enhanced security and performance [44.8840598334124]
We develop hybrid protocols by which QKD and PQC inter-operate within a joint quantum-classical network.
In particular, we consider different hybrid designs that may offer enhanced speed and/or security over the individual performance of either approach.
arXiv Detail & Related papers (2024-11-02T00:02:01Z) - Practical quantum secure direct communication with squeezed states [37.69303106863453]
We report the first table-top experimental demonstration of a CV-QSDC system and assess its security.<n>This realization paves the way into future threat-less quantum metropolitan networks, compatible with coexisting advanced wavelength division multiplexing (WDM) systems.
arXiv Detail & Related papers (2023-06-25T19:23:42Z) - Simple Proof of Security of the multiparty Prepare and Measure QKD [0.0]
This paper examines the prepare and measure version of multiparty communication through quantum key distribution.
It is sufficient to have the capability of preparing and measuring a single qubit state.
arXiv Detail & Related papers (2022-04-11T16:01:12Z) - Security analysis method for practical quantum key distribution with
arbitrary encoding schemes [7.321809883860193]
We propose a security analysis method without restriction on encoding schemes.
We illustrate its ability by analyzing source flaws and a high-dimensional asymmetric protocol.
Our work has the potential to become a reference standard for the security analysis of practical QKD.
arXiv Detail & Related papers (2021-09-10T09:53:33Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.