scholarly journals Geometrical Optics Restricted Eavesdropping Analysis of Satellite-to-Satellite Secret Key Distillation

Entropy ◽  
2021 ◽  
Vol 23 (8) ◽  
pp. 950
Author(s):  
Ziwen Pan ◽  
Ivan B. Djordjevic

Traditionally, the study of quantum key distribution (QKD) assumes an omnipotent eavesdropper that is only limited by the laws of physics. However, this is not the case for specific application scenarios such as the QKD over a free-space link. In this invited paper, we introduce the geometrical optics restricted eavesdropping model for secret key distillation security analysis and apply to a few scenarios common in satellite-to-satellite applications.

Entropy ◽  
2021 ◽  
Vol 23 (8) ◽  
pp. 1003
Author(s):  
Ziwen Pan ◽  
Ivan B. Djordjevic

Quantum key distribution (QKD) assures the theoretical information security from the physical layer by safely distributing true random numbers to the communication parties as secret keys while assuming an omnipotent eavesdropper (Eve). In recent years, with the growing applications of QKD in realistic channels such as satellite-based free-space communications, certain conditions such as the unlimited power collection ability of Eve become too strict for security analysis. Thus, in this invited paper, we give a brief overview of the quantum key distribution with a geometrical optics restricted power collection ability of Eve with its potential applications.


2019 ◽  
Vol 9 (22) ◽  
pp. 4956 ◽  
Author(s):  
Xinchao Ruan ◽  
Hang Zhang ◽  
Wei Zhao ◽  
Xiaoxue Wang ◽  
Xuan Li ◽  
...  

We investigate the optical absorption and scattering properties of four different kinds of seawater as the quantum channel. The models of discrete-modulated continuous-variable quantum key distribution (CV-QKD) in free-space seawater channel are briefly described, and the performance of the four-state protocol and the eight-state protocol in asymptotic and finite-size cases is analyzed in detail. Simulation results illustrate that the more complex is the seawater composition, the worse is the performance of the protocol. For different types of seawater channels, we can improve the performance of the protocol by selecting different optimal modulation variances and controlling the extra noise on the channel. Besides, we can find that the performance of the eight-state protocol is better than that of the four-state protocol, and there is little difference between homodyne detection and heterodyne detection. Although the secret key rate of the protocol that we propose is still relatively low and the maximum transmission distance is only a few hundred meters, the research on CV-QKD over the seawater channel is of great significance, which provides a new idea for the construction of global secure communication network.


2021 ◽  
Vol 7 (1) ◽  
Author(s):  
M. Avesani ◽  
L. Calderaro ◽  
M. Schiavon ◽  
A. Stanco ◽  
C. Agnesi ◽  
...  

AbstractThe future envisaged global-scale quantum-communication network will comprise various nodes interconnected via optical fibers or free-space channels, depending on the link distance. The free-space segment of such a network should guarantee certain key requirements, such as daytime operation and the compatibility with the complementary telecom-based fiber infrastructure. In addition, space-to-ground links will require the capability of designing light and compact quantum devices to be placed in orbit. For these reasons, investigating available solutions matching all the above requirements is still necessary. Here we present a full prototype for daylight quantum key distribution at 1550 nm exploiting an integrated silicon-photonics chip as state encoder. We tested our prototype in the urban area of Padua (Italy) over a 145 m-long free-space link, obtaining a quantum bit error rate around 0.5% and an averaged secret key rate of 30 kbps during a whole sunny day (from 11:00 to 20:00). The developed chip represents a cost-effective solution for portable free-space transmitters and a promising resource to design quantum optical payloads for future satellite missions.


Quantum ◽  
2017 ◽  
Vol 1 ◽  
pp. 14 ◽  
Author(s):  
Marco Tomamichel ◽  
Anthony Leverrier

In this work we present a security analysis for quantum key distribution, establishing a rigorous tradeoff between various protocol and security parameters for a class of entanglement-based and prepare-and-measure protocols. The goal of this paper is twofold: 1) to review and clarify the stateof-the-art security analysis based on entropic uncertainty relations, and 2) to provide an accessible resource for researchers interested in a security analysis of quantum cryptographic protocols that takes into account finite resource effects. For this purpose we collect and clarify several arguments spread in the literature on the subject with the goal of making this treatment largely self-contained. More precisely, we focus on a class of prepare-and-measure protocols based on the Bennett-Brassard (BB84) protocol as well as a class of entanglement-based protocols similar to the Bennett-Brassard-Mermin (BBM92) protocol. We carefully formalize the different steps in these protocols, including randomization, measurement, parameter estimation, error correction and privacy amplification, allowing us to be mathematically precise throughout the security analysis. We start from an operational definition of what it means for a quantum key distribution protocol to be secure and derive simple conditions that serve as sufficient condition for secrecy and correctness. We then derive and eventually discuss tradeoff relations between the block length of the classical computation, the noise tolerance, the secret key length and the security parameters for our protocols. Our results significantly improve upon previously reported tradeoffs.


2021 ◽  
Author(s):  
Heng Wang ◽  
Yang Li ◽  
Yaodi Pi ◽  
Yan Pan ◽  
Yun Shao ◽  
...  

Abstract Continuous-variable quantum key distribution (CVQKD) has potential advantages of high secret key rate, which is very suitable for high-speed metropolitan network application. However, the reported highest secret key rates of the CVQKD systems up to now are limited in a few Mbps. Here, we address the fundamental experimental problems and demonstrate a single-carrier four-state CVQKD with sub-Gbps key rate within metropolitan area. In the demonstrated four-state CVQKD using local local oscillator, an ultra-low level of excess noise is obtained and a high efficient post-processing setup is designed for practically extracting the final secure keys. Thus, the achieved secure key rates are 190.54 Mbps and 137.76 Mbps and 52.48 Mbps using linear channel assuming security analysis method and 233.87 Mbps, 133.6 Mbps and 21.53 Mbps using semidefinite programming security analysis method over transmission distances of 5 km, 10 km and 25 km, respectively. This record-breaking result increases the previous secret key rate record by an order of magnitude, which is sufficient to achieve the one-time pad cryptographic task. Our work shows the road for future high-rate and large-scale CVQKD deployment in secure broadband metropolitan and access networks.


2019 ◽  
Vol 9 (1) ◽  
Author(s):  
Wei Zhao ◽  
Ronghua Shi ◽  
Duan Huang

AbstractBy manipulating the reference pulses amplitude, a security vulnerability is caused by self-reference continuous-variable quantum key distribution. In this paper, we formalize an attack strategy for reference pulses, showing that the proposed attack can compromise the practical security of CVQKD protocol. In this scheme, before the beam splitter attack, Eve intercepts the reference pulses emitted by Alice, using Bayesian algorithm to estimate phase shifts. Subsequently, other reference pulses are re-prepared and resubmitted to Bob. In simulations, Bayesian algorithm effectively estimates the phase drifts and has the high robustness to noise. Therefore, the eavesdropper can bias the excess noise due to the intercept-resend attack and the beam splitter attack. And Alice and Bob believe that their excess noise is below the null key threshold and can still share a secret key. Consequently, the proposed attack shows that its practical security can be compromised by transmitting the reference pulses in the continuous-variable quantum key distribution protocol.


Author(s):  
Hiền

Phân phối khoá lượng tử QKD (Quantum Key Distribution) là giải pháp có khả năng đảm an ninh vô điều kiện nhờ áp dụng luật cơ lượng tử để phân phối khóa an toàn giữa hai bên hợp pháp với sự hiện diện của kẻ nghe lén. Sử dụng vệ tinh để phân phối khóa lượng tử tới các trạm mặt đất qua kênh quang không gian tự do FSO (Free Space Optic) là giải pháp hứa hẹn tạo ra một mạng QKD phạm vi toàn cầu. Tuy nhiên, do ảnh hưởng của kênh FSO, đặc biệt là nhiễu loạn khí quyển, tốc độ truyền khóa bí mật SKR (Secret Key Rate) của các hệ thống QKD hiện tại bị hạn chế. Do đó, nghiên cứu này đề xuất mô hình hệ thống QKD đa kênh dựa trên ghép kênh phân chia theo bước sóng WDM (Wavelength Division Multiplexing) và ghép kênh sóng mang phụ SCM (Sub Carrier Multiplexing) nhằm tăng SKR. Sử dụng phương pháp phân tích lý thuyết với các công cụ giải tích và xác suất, nhóm tác giả đã xây dựng các công thức tính toán SKR và tỉ lệ lỗi bit lượng tử của hệ thống đề xuất. Kết quả khảo sát hiệu năng cho thấy, hệ thống QKD đa kênh cho phép cải thiện SKR so với hệ thống đơn kênh trong khi vẫn đảm bảo yêu cầu về QBER (Quantum Bit Error Rate).


2018 ◽  
Vol 8 (10) ◽  
pp. 1951 ◽  
Author(s):  
Fei Li ◽  
Hai Zhong ◽  
Yijun Wang ◽  
Ye Kang ◽  
Duan Huang ◽  
...  

Performance analysis of continuous-variable quantum key distribution (CVQKD) has been one of the focuses of quantum communications. In this paper, we propose an approach to enhancing the secret rate of CVQKD with the multi-core fiber (MCF) system that transmits multiple spatial modes simultaneously. The excess noise contributed by the inter-core crosstalk between cores can be effectively suppressed by quantum channel wavelength management, leading to the performance improvement of the MCF-based CVQKD system. In the security analysis, we perform numerical simulations for the Gaussian-modulated coherent state CVQKD protocol, considering simultaneously the extra insert loss of fan-in/fan-out (FIFO), which is the extra optical device that should be used at the input and the output of the fiber. Simulation results show that the performance of the one-way and two-way protocols for each core are slightly degraded because of the insert loss of the FIFO, but the total secret key rate can be increased, whereas the performance of the measurement-device-independent CVQKD protocol will be degraded due to the effect of the insert loss of the FIFO. These results may provide theoretical foundation for the space-division multiplexing CVQKD system.


Author(s):  
Zhongqi Sun ◽  
Jipeng Wang ◽  
Zhenhua Li ◽  
Wenxiu Qu ◽  
Tianqi Dou ◽  
...  

During free-space quantum key distribution, the rotation and fluctuation of reference frame degrades the performance of quantum key distribution (QKD). Reference-frame-independent QKD (RFI-QKD) overcomes this issue effectively. To date, much theoretical and experimental research has been conducted on the performance of free-space RFI-QKD. However, these studies are all based on free-space air and satellite ground, and none have investigated the performance of RFI-QKD in an underwater channel. Therefore, this paper constructed a channel model that considered both scattering and optical attenuation to obtain an RFI-QKD secret key rate in an underwater channel. The simulation results confirm that even in a relatively harsh underwater scenario, RFI-QKD maintains good performance.


2021 ◽  
Author(s):  
Lingzhi Kong ◽  
Weiqi Liu ◽  
Fan Jing ◽  
Chen He

Abstract When developing practical continuous-variable quantum key distribution (CVQKD), detector is necessary at the receiver’s side.We investigate the practical security of the CVQKD system with unbalanced heterodyne detector.The result shows that unbalanced heterodyne detector introduces extra excess noise into system and decreases the lower bound of secret key rate without awareness of the legitimate communicators, which leaves loopholes for Eve to attack the system. In addition, we find that the secret key rate decreases more severely with the increase of the degree of imbalance and the excess noise induced by the imbalance is proportional to the intensity of local oscillator (LO) under the same degree of imbalance. Finally, the countermeasure is proposed to resist this kind of effects.


Sign in / Sign up

Export Citation Format

Share Document