A study of BB84 protocol in a device-independent scenario: from the view of entanglement distillation

2013 ◽  
Vol 13 (9&10) ◽  
pp. 827-832
Author(s):  
Zhen-Qiang Yin ◽  
Wei Chen ◽  
Shuang Wang ◽  
Hong-Wei Li ◽  
Guang-Can Guo ◽  
...  

For the past few years, the security of practical quantum key distribution systems has attracted a lot of attention. Device-independent quantum key distribution was proposed to design a real-life secure quantum key distribution system with imperfect and untrusted quantum devices. In this paper, we analyzed the security of BB84 protocol in a device-independent scenario based on the entanglement distillation method. Since most of the reported loopholes are in receivers of quantum key distribution systems, we focus on condition that the transmitter of the system is perfectly coincident with the requirement of the BB84 protocol, while the receiver can be controlled by eavesdropper. Finally, the lower bound of the final secret-key rate was proposed and we explained why the secure-key rate is similar to the well-known result for the original entanglement distillation protocol.

2014 ◽  
pp. 811-840
Author(s):  
K. E. Rumyantsev ◽  
D. M. Golubchikov

This chapter is an analysis of commercial quantum key distribution systems. Upon analysis, the generalized structure of QKDS with phase coding of a photon state is presented. The structure includes modules that immediately participate in the task of distribution and processing of quantum states. Phases of key sequence productions are studied. Expressions that allow the estimation of physical characteristics of optoelectronic components, as well as information processing algorithms impact to rate of key sequence production, are formed. Information security infrastructure can be utilized, for instance, to formulate requirements to maximize tolerable error level in quantum channel with a given rate of key sequence production.


2011 ◽  
Vol 11 (11&12) ◽  
pp. 937-947
Author(s):  
Hong-Wei Li ◽  
Zhen-Qiang Yin ◽  
Shuang Wang ◽  
Wan-Su Bao ◽  
Guang-Can Guo ◽  
...  

In practical quantum key distribution system, the state preparation and measurement have state-dependent imperfections comparing with the ideal BB84 protocol. If the state-dependent imperfection can not be regarded as an unitary transformation, it should not be considered as part of quantum channel noise introduced by the eavesdropper, the commonly used secret key rate formula GLLP can not be applied correspondingly. In this paper, the unconditional security of quantum key distribution with state-dependent imperfections will be analyzed by estimating upper bound of the phase error rate in the quantum channel and the imperfect measurement. Interestingly, since Eve can not control all phase error in the quantum key distribution system, the final secret key rate under constant quantum bit error rate can be improved comparing with the perfect quantum key distribution protocol.


Author(s):  
Ming Fang ◽  
Ya-Ping Li ◽  
Li Fei

Quantum key distribution (QKD) allows authenticated parties to share secure keys. Its security comes from quantum physics rather than computational complexity. The previous work has been able to demonstrate the security of the BB84 protocol based on the uncertainty principle, entanglement purification and information theory. In the security proof method based on entanglement purification, it is assumed that the information of Calderbank–Shor–Steane (CSS) error correction code cannot be leaked, otherwise, it is insecure. However, there is no quantitative analysis of the relationship between the parameter of CSS code and the amount of information leaked. In the attack and defense strategy of the actual quantum key distribution system, especially in the application of the device that is easy to lose or out of control, it is necessary to assess the impact of the parameter leakage. In this paper, we derive the relationship between the leaked parameter of CSS code and the amount of the final key leakage based on the BB84 protocol. Based on this formula, we simulated the impact of different CSS code parameter leaks on the final key amount. Through the analysis of simulation results, the security of the BB84 protocol is inversely proportional to the value of [Formula: see text] and [Formula: see text] in the case of the CSS code leak.


Entropy ◽  
2021 ◽  
Vol 23 (5) ◽  
pp. 509
Author(s):  
Anton Pljonkin ◽  
Dmitry Petrov ◽  
Lilia Sabantina ◽  
Kamila Dakhkilgova

The article is focused on research of an attack on the quantum key distribution system and proposes a countermeasure method. Particularly noteworthy is that this is not a classic attack on a quantum protocol. We describe an attack on the process of calibration. Results of the research show that quantum key distribution systems have vulnerabilities not only in the protocols, but also in other vital system components. The described type of attack does not affect the cryptographic strength of the received keys and does not point to the vulnerability of the quantum key distribution protocol. We also propose a method for autocompensating optical communication system development, which protects synchronization from unauthorized access. The proposed method is based on the use of sync pulses attenuated to a photon level in the process of detecting a time interval with a signal. The paper presents the results of experimental studies that show the discrepancies between the theoretical and real parameters of the system. The obtained data allow the length of the quantum channel to be calculated with high accuracy.


2013 ◽  
Vol 275-277 ◽  
pp. 2515-2518
Author(s):  
Xiao Qiang Guo ◽  
Cui Ling Luo ◽  
Yan Yan

Quantum key distribution (QKD) uses quantum mechanics to guarantee secure communication. It enables two parties to produce a shared random secret key known only to them, which can then be used to encrypt and decrypt messages. QKD is a research hotspot of international academia in recent years. We introduce some protocols: BB84 protocol, E91 protocol, SARG04 protocol.


2021 ◽  
Author(s):  
Tao Wang ◽  
Peng Huang ◽  
Lang Li ◽  
Yingming Zhou ◽  
Guihua Zeng

Abstract Secret key rate is a core performance indicator in implementing quantum key distribution, which directly determines the transmission rate of enciphered data. Here we demonstrate a high-key-rate quantum key distribution system over mature telecom components. The entire framework of quantum key distribution over these components is constructed. The high-rate low-noise Gaussian modulation of coherent states is realized by a classical electro-optic IQ modulator. High-baud low-intensity quantum signals are received by a commercial integrated coherent receiver under the shot-noise limit. A series of digital signal processing algorithms are proposed to achieve accurate signal recovery and key distillation. The system has yield a secret key rate of 10.37 Mbps, 1.61 Mbps, 337.82 kbps, and 58.06 kbps under the standard telecom fiber of 20 km, 50 km, 70 km, and 100 km, respectively. Our results represent the achieved highest secret key generation rate for quantum key distribution using continuous variables at a standard telecom wavelength. Moreover, it breaks the isolation between quantum communication and classical optical communication in terms of components, and opens the way to a high-speed and cost-effective formation of metropolitan quantum secure communication networks.


2019 ◽  
Vol 17 (01) ◽  
pp. 1950005
Author(s):  
Peng Zhang ◽  
Rong-Zhen Jiao

The performance of measurement-device-independent quantum key distribution (MDI-QKD) with different numbers of decoy-state are compared. The statistical fluctuation due to the finite length of data is considered based on the standard statistical analysis. The simulation results show that two-decoy-state method is a nearly optimal estimation in the asymptotic case. In the condition of considering statistical fluctuations, the finite length of raw key will slightly decrease the secret key rate. In all simulation cases, the key rate is maximized by optimizing the intensities of the signals. Our numerical simulation may provide valuable theoretical reference for the practical MDI-QKD experiments.


Sign in / Sign up

Export Citation Format

Share Document