scholarly journals The Impact of Fiber Dispersion on the Performance of Entanglement-based Dispersive Optics Quantum Key Distribution

Author(s):  
Jing-Yuan Liu ◽  
Xu Liu ◽  
Wei Zhang ◽  
Yi-Dong Huang
Entropy ◽  
2021 ◽  
Vol 23 (11) ◽  
pp. 1395
Author(s):  
Yin Li ◽  
Yijun Wang ◽  
Yun Mao ◽  
Weishao Peng ◽  
Di Jin ◽  
...  

An improved continuous variable quantum key distribution (CVQKD) approach based on a heralded hybrid linear amplifier (HLA) is proposed in this study, which includes an ideal deterministic linear amplifier and a probabilistic noiseless linear amplifier. The CVQKD, which is based on an amplifier, enhances the signal-to-noise ratio and provides for fine control between high gain and strong noise reduction. We focus on the impact of two types of optical amplifiers on system performance: phase sensitive amplifiers (PSA) and phase insensitive amplifiers (PIA). The results indicate that employing amplifiers, local local oscillation-based CVQKD systems can enhance key rates and communication distances. In addition, the PIA-based CVQKD system has a broader application than the PSA-based system.


Author(s):  
Garrett Simon ◽  
Blake Huff ◽  
William Meier ◽  
Lee Harrell

Measurement-Device-Independent Quantum Key Distribution (MDI-QKD) is a two-photon protocol devised to eliminate eavesdropping attacks that interrogate or control the detector in realized quantum key distribution systems. In MDI-QKD, the measurements are carried out by an untrusted third party, and the measurement results are announced openly. Knowledge or control of the measurement results gives the third party no information about the secret key. Error-free implementation of the MDI-QKD protocol requires the crypto-communicating parties, Alice and Bob, to independently prepare and transmit single photons that are physically indistinguishable, with the possible exception of their polarization states. In this paper, we apply the formalism of quantum optics and Monte Carlo simulations to quantify the impact of small errors in wavelength, bandwidth, polarization and timing between Alice's photons and Bob's photons on the MDI-QKD quantum bit error rate (QBER). Using published single-photon source characteristics from two-photon interference experiments as a test case, our simulations predict that the finite tolerances of these sources contribute (4.04+/-20/Nsifted) to the QBER in an MDI-QKD implementation generating an Nsifted-bit sifted key.


Author(s):  
Ming Fang ◽  
Ya-Ping Li ◽  
Li Fei

Quantum key distribution (QKD) allows authenticated parties to share secure keys. Its security comes from quantum physics rather than computational complexity. The previous work has been able to demonstrate the security of the BB84 protocol based on the uncertainty principle, entanglement purification and information theory. In the security proof method based on entanglement purification, it is assumed that the information of Calderbank–Shor–Steane (CSS) error correction code cannot be leaked, otherwise, it is insecure. However, there is no quantitative analysis of the relationship between the parameter of CSS code and the amount of information leaked. In the attack and defense strategy of the actual quantum key distribution system, especially in the application of the device that is easy to lose or out of control, it is necessary to assess the impact of the parameter leakage. In this paper, we derive the relationship between the leaked parameter of CSS code and the amount of the final key leakage based on the BB84 protocol. Based on this formula, we simulated the impact of different CSS code parameter leaks on the final key amount. Through the analysis of simulation results, the security of the BB84 protocol is inversely proportional to the value of [Formula: see text] and [Formula: see text] in the case of the CSS code leak.


2021 ◽  
Vol 8 (1) ◽  
Author(s):  
Daniel Pereira ◽  
Margarida Almeida ◽  
Margarida Facão ◽  
Armando N. Pinto ◽  
Nuno A. Silva

AbstractContinuous-variable quantum key distribution (CV-QKD) provides a theoretical unconditionally secure solution to distribute symmetric keys among users in a communication network. However, the practical devices used to implement these systems are intrinsically imperfect, and, as a result, open the door to eavesdropper attacks. In this work, we show the impact of receiver device imperfections on the estimated channel parameters, performance and security of a CV-QKD system. The presented results show that, due to the erroneously estimated channel parameters, non-monitored imbalances can pose a security risk or even reduce the system’s performance. Our results show the importance of monitoring these imbalances and hint at the possibility of compensating for some receiver imbalances by tuning other components.


2017 ◽  
Vol 31 (16) ◽  
pp. 1750143 ◽  
Author(s):  
Xiaoqun Wang ◽  
Chunhui Huang

The performance of one-way and two-way continuous variable quantum key distribution (CVQKD) protocols can be increased by adding some noise on the reconciliation side. In this paper, we propose to add noise at the reconciliation end to improve the performance of CVQKD with untrusted source. We derive the key rate of this case and analyze the impact of the additive noise. The simulation results show that the optimal additive noise can improve the performance of the system in terms of maximum transmission distance and tolerable excess noise.


Quantum ◽  
2021 ◽  
Vol 5 ◽  
pp. 443
Author(s):  
Erik Woodhead ◽  
Antonio Acín ◽  
Stefano Pironio

The simplest device-independent quantum key distribution protocol is based on the Clauser-Horne-Shimony-Holt (CHSH) Bell inequality and allows two users, Alice and Bob, to generate a secret key if they observe sufficiently strong correlations. There is, however, a mismatch between the protocol, in which only one of Alice's measurements is used to generate the key, and the CHSH expression, which is symmetric with respect to Alice's two measurements. We therefore investigate the impact of using an extended family of Bell expressions where we give different weights to Alice's measurements. Using this family of asymmetric Bell expressions improves the robustness of the key distribution protocol for certain experimentally-relevant correlations. As an example, the tolerable error rate improves from 7.15% to about 7.42% for the depolarising channel. Adding random noise to Alice's key before the postprocessing pushes the threshold further to more than 8.34%. The main technical result of our work is a tight bound on the von Neumann entropy of one of Alice's measurement outcomes conditioned on a quantum eavesdropper for the family of asymmetric CHSH expressions we consider and allowing for an arbitrary amount of noise preprocessing.


2017 ◽  
Vol 2017 ◽  
pp. 1-10 ◽  
Author(s):  
Rameez Asif ◽  
William J. Buchanan

There is current significant interest in Fiber-to-the-Home (FTTH) networks, that is, end-to-end optical connectivity. Currently, it may be limited due to the presence of last-mile copper wire connections. However, in near future, it is envisaged that FTTH connections will exist, and a key offering would be the possibility of optical encryption that can best be implemented using Quantum Key Distribution (QKD). However, it is very important that the QKD infrastructure is compatible with the already existing networks for a smooth transition and integration with the classical data traffic. In this paper, we report the feasibility of using off-the-shelf telecommunication components to enable high performance Continuous Variable-Quantum Key Distribution (CV-QKD) systems that can yield secure key rates in the range of 100 Mbits/s under practical operating conditions. Multilevel phase modulated signals (m-PSK) are evaluated in terms of secure key rates and transmission distances. The traditional receiver is discussed, aided by the phase noise cancellation based digital signal processing module for detecting the complex quantum signals. Furthermore, we have discussed the compatibility of multiplexers and demultiplexers for wavelength division multiplexed Quantum-to-the-Home (QTTH) network and the impact of splitting ratio is analyzed. The results are thoroughly compared with the commercially available high-cost encryption modules.


Author(s):  
Douglas D Hodson ◽  
Michael R Grimaila ◽  
Logan O Mailloux ◽  
Colin V McLaughlin ◽  
Gerald Baumgartner

This article presents the background, development, and implementation of a simulation framework used to model the quantum exchange aspects of Quantum Key Distribution (QKD) systems. The presentation of our simulation framework is novel from several perspectives, one of which is the lack of published information in this area. QKD is an innovative technology which exploits the laws of quantum mechanics to generate and distribute unconditionally secure cryptographic keys. While QKD offers the promise of unconditionally secure key distribution, real world systems are built from non-ideal components which necessitates the need to understand the impact these non-idealities have on system performance and security. To study these non-idealities we present the development of a quantum communications modeling and simulation capability. This required a suitable mathematical representation of quantum optical pulses and optical component transforms. Furthermore, we discuss how these models are implemented within our Discrete Event Simulation-based framework and show how it is used to study a variety of QKD implementations.


Sign in / Sign up

Export Citation Format

Share Document