scholarly journals Implementing the decoy state protocol in a practically oriented Quantum Key Distribution system-level model

Author(s):  
Ryan D Engle ◽  
Logan O Mailloux ◽  
Michael R Grimaila ◽  
Douglas D Hodson ◽  
Colin V McLaughlin ◽  
...  

Quantum Key Distribution (QKD) is an emerging cybersecurity technology that exploits the laws of quantum mechanics to generate unconditionally secure symmetric cryptographic keying material. The unique nature of QKD shows promise for high-security environments such as those found in banking, government, and the military. However, QKD systems often have implementation non-idealities that can negatively impact their performance and security. This article describes the development of a system-level model designed to study implementation non-idealities in commercially available decoy state enabled QKD systems. Specifically, this paper provides a detailed discussion of the decoy state protocol, its implementation, and its usage to detect sophisticated attacks, such as the photon number splitting attack. In addition, this work suggests an efficient and repeatable systems engineering methodology for understanding and studying communications protocols, architectures, operational configurations, and implementation tradeoffs in complex cyber systems.

2021 ◽  
Vol 11 (1) ◽  
Author(s):  
Shengjun Ren ◽  
Shuai Yang ◽  
Adrian Wonfor ◽  
Ian White ◽  
Richard Penty

AbstractWe present an experimental demonstration of the feasibility of the first 20 + Mb/s Gaussian modulated coherent state continuous variable quantum key distribution system with a locally generated local oscillator at the receiver (LLO-CVQKD). To increase the signal repetition rate, and hence the potential secure key rate, we equip our system with high-performance, wideband devices and design the components to support high repetition rate operation. We have successfully trialed the signal repetition rate as high as 500 MHz. To reduce the system complexity and correct for any phase shift during transmission, reference pulses are interleaved with quantum signals at Alice. Customized monitoring software has been developed, allowing all parameters to be controlled in real-time without any physical setup modification. We introduce a system-level noise model analysis at high bandwidth and propose a new ‘combined-optimization’ technique to optimize system parameters simultaneously to high precision. We use the measured excess noise, to predict that the system is capable of realizing a record 26.9 Mb/s key generation in the asymptotic regime over a 15 km signal mode fibre. We further demonstrate the potential for an even faster implementation.


2022 ◽  
Vol 105 (1) ◽  
Author(s):  
Giulio Foletto ◽  
Francesco Picciariello ◽  
Costantino Agnesi ◽  
Paolo Villoresi ◽  
Giuseppe Vallone

2009 ◽  
Vol 58 (4) ◽  
pp. 2189
Author(s):  
Jiao Rong-Zhen ◽  
Zhang Wen-Han

2010 ◽  
Vol 19 (10) ◽  
pp. 100312 ◽  
Author(s):  
Xu Fang-Xing ◽  
Wang Shuang ◽  
Han Zheng-Fu ◽  
Guo Guang-Can

2019 ◽  
Vol 17 (01) ◽  
pp. 1950005
Author(s):  
Peng Zhang ◽  
Rong-Zhen Jiao

The performance of measurement-device-independent quantum key distribution (MDI-QKD) with different numbers of decoy-state are compared. The statistical fluctuation due to the finite length of data is considered based on the standard statistical analysis. The simulation results show that two-decoy-state method is a nearly optimal estimation in the asymptotic case. In the condition of considering statistical fluctuations, the finite length of raw key will slightly decrease the secret key rate. In all simulation cases, the key rate is maximized by optimizing the intensities of the signals. Our numerical simulation may provide valuable theoretical reference for the practical MDI-QKD experiments.


2014 ◽  
Vol 4 (1) ◽  
Author(s):  
Shi-Hai Sun ◽  
Mu-Sheng Jiang ◽  
Xiang-Chun Ma ◽  
Chun-Yan Li ◽  
Lin-Mei Liang

Abstract Quantum key distribution (QKD) provides means for unconditional secure key transmission between two distant parties. However, in practical implementations, it suffers from quantum hacking due to device imperfections. Here we propose a hybrid measurement attack, with only linear optics, homodyne detection and single photon detection, to the widely used vacuum + weak decoy state QKD system when the phase of source is partially randomized. Our analysis shows that, in some parameter regimes, the proposed attack would result in an entanglement breaking channel but still be able to trick the legitimate users to believe they have transmitted secure keys. That is, the eavesdropper is able to steal all the key information without discovered by the users. Thus, our proposal reveals that partial phase randomization is not sufficient to guarantee the security of phase-encoding QKD systems with weak coherent states.


Sign in / Sign up

Export Citation Format

Share Document