Quantum Key Distribution with Imperfections: Recent Advances in Security Proofs
- URL: http://arxiv.org/abs/2602.05057v1
- Date: Wed, 04 Feb 2026 21:16:33 GMT
- Title: Quantum Key Distribution with Imperfections: Recent Advances in Security Proofs
- Authors: Patrick Andriolo, Esteban Vasques, Elizabeth Agudelo, Max Riegler, Matej Pivoluska, Gláucia Murta,
- Abstract summary: Quantum Key Distribution (QKD) can enable two spatially separated parties to establish an information-theoretically secure encryption.<n>Security proofs robust against a wide range of eavesdropping strategies have established the theoretical soundness of several QKD protocols.<n>Most proofs are based on idealized models of the physical systems involved in such protocols and often include assumptions that are not satisfied in practical implementations.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: In contrast to classical cryptography, where the security of encoded messages typically relies on the inability of standard algorithms to overcome computational complexity assumptions, Quantum Key Distribution (QKD) can enable two spatially separated parties to establish an information-theoretically secure encryption, provided that the QKD protocol is underpinned by a security proof. In the last decades, security proofs robust against a wide range of eavesdropping strategies have established the theoretical soundness of several QKD protocols. However, most proofs are based on idealized models of the physical systems involved in such protocols and often include assumptions that are not satisfied in practical implementations. This mismatch creates a gap between theoretical security guarantees and actual experimental realizations, making QKD protocols vulnerable to attacks. To ensure the security of real-world QKD systems, it is therefore essential to account for imperfections in security analyses. In this article, we present an overview of recent analytical and numerical developments in QKD security proofs, which provide a versatile approach for incorporating imperfections and re-establishing the security of quantum communication protocols under realistic conditions.
Related papers
- An introductory review of the theory of continuous-variable quantum key distribution: Fundamentals, protocols, and security [35.18016233072556]
Continuous-variable quantum key distribution (CV-QKD) has emerged as a promising approach for secure quantum communication.<n>CV-QKD offers advantages such as high key generation rates, compatibility with standard telecommunication infrastructure, and potential for integration on photonic chips.<n>This review provides an accessible introduction to the theory of CV-QKD, aimed at researchers entering this rapidly developing field.
arXiv Detail & Related papers (2025-12-01T15:03:19Z) - Quantum Key Distribution: Bridging Theoretical Security Proofs, Practical Attacks, and Error Correction for Quantum-Augmented Networks [0.0]
Quantum Key Distribution (QKD) is revolutionizing cryptography by promising information-theoretic security through the immutable laws of quantum mechanics.<n>Yet, the challenge of transforming idealized security models into practical, resilient systems remains a pressing issue.<n>This review critically dissects and synthesizes the latest advancements in QKD protocols and their security vulnerabilities.
arXiv Detail & Related papers (2025-11-25T18:31:02Z) - Numerical security analysis for quantum key distribution with partial state characterization [0.34952465649465553]
We introduce a novel security proof technique that can evaluate the secret-key rate for both prepare-and-measure and measurement-device-independent QKD protocols.<n>We demonstrate that our method can outperform current analytical approaches addressing partial state characterization in terms of achievable secret-key rates.
arXiv Detail & Related papers (2025-03-10T12:08:25Z) - Application of $α$-order Information Metrics for Secure Communication in Quantum Physical Layer Design [45.41082277680607]
We study the $alpha$-order information-theoretic metrics based on R'enyi entropy.<n>We apply our framework to a practical scenario involving BPSK modulation over a lossy bosonic channel.
arXiv Detail & Related papers (2025-02-07T03:44:11Z) - High-Fidelity Coherent-One-Way QKD Simulation Framework for 6G Networks: Bridging Theory and Reality [105.73011353120471]
Quantum key distribution (QKD) has been emerged as a promising solution for guaranteeing information-theoretic security.<n>Due to the considerable high-cost of QKD equipment, a lack of QKD communication system design tools is challenging.<n>This paper introduces a QKD communication system design tool.
arXiv Detail & Related papers (2025-01-21T11:03:59Z) - Loss-tolerant quantum key distribution with detection efficiency mismatch [39.58317527488534]
We establish a security proof for the loss-tolerant P&M QKD protocol that incorporates imperfections in both the source and the detectors.<n>Specifically, we demonstrate the security of this scheme when the emitted states deviate from the ideal ones.
arXiv Detail & Related papers (2024-12-12T19:01:56Z) - Practical hybrid PQC-QKD protocols with enhanced security and performance [44.8840598334124]
We develop hybrid protocols by which QKD and PQC inter-operate within a joint quantum-classical network.
In particular, we consider different hybrid designs that may offer enhanced speed and/or security over the individual performance of either approach.
arXiv Detail & Related papers (2024-11-02T00:02:01Z) - Coding-Based Hybrid Post-Quantum Cryptosystem for Non-Uniform Information [53.85237314348328]
We introduce for non-uniform messages a novel hybrid universal network coding cryptosystem (NU-HUNCC)
We show that NU-HUNCC is information-theoretic individually secured against an eavesdropper with access to any subset of the links.
arXiv Detail & Related papers (2024-02-13T12:12:39Z) - Finite-Key Analysis for Coherent One-Way Quantum Key Distribution [18.15943439545963]
Coherent-one-way (COW) quantum key distribution (QKD) is a significant communication protocol that has been implemented experimentally and deployed in practical products.
Existing security analyses of COW-QKD either provide a short transmission distance or lack immunity against coherent attacks in the finite-key regime.
We present a tight finite-key framework for a variant of COW-QKD, which has been proven to extend the secure transmission distance in the case.
arXiv Detail & Related papers (2023-09-28T03:32:06Z) - Practical quantum secure direct communication with squeezed states [37.69303106863453]
We report the first table-top experimental demonstration of a CV-QSDC system and assess its security.<n>This realization paves the way into future threat-less quantum metropolitan networks, compatible with coexisting advanced wavelength division multiplexing (WDM) systems.
arXiv Detail & Related papers (2023-06-25T19:23:42Z) - Simple and Rigorous Proof Method for the Security of Practical Quantum
Key Distribution in the Single-Qubit Regime Using Mismatched Basis
Measurements [0.2519906683279153]
Quantum key distribution (QKD) protocols aim at allowing two parties to generate a secret shared key.
While many QKD protocols have been proven unconditionally secure in theory, practical security analyses of experimental QKD implementations typically do not take into account all possible loopholes.
We present a simple method of computing secure key rates for any practical implementation of discrete-variable QKD.
arXiv Detail & Related papers (2022-08-29T17:37:58Z) - Security analysis method for practical quantum key distribution with
arbitrary encoding schemes [7.321809883860193]
We propose a security analysis method without restriction on encoding schemes.
We illustrate its ability by analyzing source flaws and a high-dimensional asymmetric protocol.
Our work has the potential to become a reference standard for the security analysis of practical QKD.
arXiv Detail & Related papers (2021-09-10T09:53:33Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.