Influence of avalanche-photodiode dead time on the security of high-speed quantum-key distribution systems

Author(s):  
Hai Xu ◽  
Lijun Ma ◽  
Joshua C. Bienfang ◽  
Xiao Tang
2007 ◽  
Vol 9 (9) ◽  
pp. 319-319 ◽  
Author(s):  
Daniel J Rogers ◽  
Joshua C Bienfang ◽  
Anastase Nakassis ◽  
Hai Xu ◽  
Charles W Clark

2014 ◽  
Vol 14 (3&4) ◽  
pp. 217-235
Author(s):  
Viacheslav Burenkov ◽  
Bing Qi ◽  
Ben Fortescue ◽  
Hoi-Kwong Lo

The security of a high speed quantum key distribution system with finite detector dead time $\tau$ is analyzed. When the transmission rate becomes higher than the maximum count rate of the individual detectors ($1/\tau$), security issues affect the scheme for sifting bits. Analytical calculations and numerical simulations of the Bennett-Brassard BB84 protocol are performed. We study Rogers et al.'s scheme (further information is available in [D. J. Rogers, J. C. Bienfang, A. Nakassis, H. Xu, and C. W. Clark, New J. Phys.~{\bf 9}, 319 (2007)]) in the presence of an active eavesdropper Eve who has the power to perform an intercept-resend attack. It is shown that Rogers et al.'s scheme is no longer guaranteed to be secure. More specifically, Eve can induce a basis-dependent detection efficiency at the receiver's end. Modified key sifting schemes that are basis-independent and thus secure in the presence of dead time and an active eavesdropper are then introduced. We analyze and compare these secure sifting schemes for this active Eve scenario, and calculate and simulate their key generation rate. It is shown that the maximum key generation rate is $1/(2\tau)$ for passive basis selection, and $1/\tau$ for active basis selection. The security analysis for finite detector dead time is also extended to the decoy state BB84 protocol for one particular secure sifting scheme.


Cryptography ◽  
2017 ◽  
Vol 1 (3) ◽  
pp. 18 ◽  
Author(s):  
Anton Pljonkin ◽  
Konstantin Rumyantsev ◽  
Pradeep Singh

2005 ◽  
Author(s):  
Xiao Tang ◽  
Lijun Ma ◽  
Alan Mink ◽  
Anastase Nakassis ◽  
Barry Hershman ◽  
...  

2014 ◽  
pp. 811-840
Author(s):  
K. E. Rumyantsev ◽  
D. M. Golubchikov

This chapter is an analysis of commercial quantum key distribution systems. Upon analysis, the generalized structure of QKDS with phase coding of a photon state is presented. The structure includes modules that immediately participate in the task of distribution and processing of quantum states. Phases of key sequence productions are studied. Expressions that allow the estimation of physical characteristics of optoelectronic components, as well as information processing algorithms impact to rate of key sequence production, are formed. Information security infrastructure can be utilized, for instance, to formulate requirements to maximize tolerable error level in quantum channel with a given rate of key sequence production.


2021 ◽  
pp. 259-267
Author(s):  
Kamal Kishor Choure ◽  
Ankur Saharia ◽  
Nitesh Mudgal ◽  
Manish Tiwari ◽  
Ghanshyam Singh

Sign in / Sign up

Export Citation Format

Share Document