Modeling of Quantum Key Distribution System for Secure Information Transfer

Author(s):  
K. E. Rumyantsev ◽  
D. M. Golubchikov

This chapter is an analysis of commercial quantum key distribution systems. Upon analysis, the generalized structure of QKDS with phase coding of a photon state is presented. The structure includes modules that immediately participate in the task of distribution and processing of quantum states. Phases of key sequence productions are studied. Expressions that allow the estimation of physical characteristics of optoelectronic components, as well as information processing algorithms impact to rate of key sequence production, are formed. Information security infrastructure can be utilized, for instance, to formulate requirements to maximize tolerable error level in quantum channel with a given rate of key sequence production.

2014 ◽  
pp. 811-840
Author(s):  
K. E. Rumyantsev ◽  
D. M. Golubchikov

This chapter is an analysis of commercial quantum key distribution systems. Upon analysis, the generalized structure of QKDS with phase coding of a photon state is presented. The structure includes modules that immediately participate in the task of distribution and processing of quantum states. Phases of key sequence productions are studied. Expressions that allow the estimation of physical characteristics of optoelectronic components, as well as information processing algorithms impact to rate of key sequence production, are formed. Information security infrastructure can be utilized, for instance, to formulate requirements to maximize tolerable error level in quantum channel with a given rate of key sequence production.


Entropy ◽  
2021 ◽  
Vol 23 (5) ◽  
pp. 509
Author(s):  
Anton Pljonkin ◽  
Dmitry Petrov ◽  
Lilia Sabantina ◽  
Kamila Dakhkilgova

The article is focused on research of an attack on the quantum key distribution system and proposes a countermeasure method. Particularly noteworthy is that this is not a classic attack on a quantum protocol. We describe an attack on the process of calibration. Results of the research show that quantum key distribution systems have vulnerabilities not only in the protocols, but also in other vital system components. The described type of attack does not affect the cryptographic strength of the received keys and does not point to the vulnerability of the quantum key distribution protocol. We also propose a method for autocompensating optical communication system development, which protects synchronization from unauthorized access. The proposed method is based on the use of sync pulses attenuated to a photon level in the process of detecting a time interval with a signal. The paper presents the results of experimental studies that show the discrepancies between the theoretical and real parameters of the system. The obtained data allow the length of the quantum channel to be calculated with high accuracy.


2013 ◽  
Vol 13 (9&10) ◽  
pp. 827-832
Author(s):  
Zhen-Qiang Yin ◽  
Wei Chen ◽  
Shuang Wang ◽  
Hong-Wei Li ◽  
Guang-Can Guo ◽  
...  

For the past few years, the security of practical quantum key distribution systems has attracted a lot of attention. Device-independent quantum key distribution was proposed to design a real-life secure quantum key distribution system with imperfect and untrusted quantum devices. In this paper, we analyzed the security of BB84 protocol in a device-independent scenario based on the entanglement distillation method. Since most of the reported loopholes are in receivers of quantum key distribution systems, we focus on condition that the transmitter of the system is perfectly coincident with the requirement of the BB84 protocol, while the receiver can be controlled by eavesdropper. Finally, the lower bound of the final secret-key rate was proposed and we explained why the secure-key rate is similar to the well-known result for the original entanglement distillation protocol.


2021 ◽  
Author(s):  
Hong-Wei Li ◽  
Chun-Mei Zhang ◽  
Mu-Sheng Jiang ◽  
Qing-Yu Cai

Abstract To improve the maximal transmission distance and the maximal error rate tolerance, we apply the advantage distillation technology to analyze security of the practical decoy-sate quantum key distribution system. Based on the practical experimental parameters, the device-dependent quantum key distribution protocols and the measurement-device-independent quantum key distribution protocols have been respectively analyzed, and our analysis results demonstrate that the advantage distillation technology can significantly improve the performance of different quantum key distribution protocols. In the four-state and six-state device-dependent quantum key distribution protocols, we prove that the maximal transmission distance can be improved from 142 km to 180 km and from 146 km to 187 km respectively. In the four-state and six-state measurement-device-independent quantum key distribution protocols, we prove that the maximal transmission distance can be improved from 195 km to 273 km and from 200 km to 282 km respectively. More interestingly, the advantage distillation technology does not need to change the hardware devices about the quantum step, thus it can be conveniently to be applied in various practical quantum key distribution systems.


2021 ◽  
Vol 8 (1) ◽  
Author(s):  
David Lowndes ◽  
Stefan Frick ◽  
Andy Hart ◽  
John Rarity

AbstractWe present a miniaturized quantum key distribution system, designed to augment the more mature quantum key distribution systems currently commercially available. Our device is designed for the consumer market, and so size, weight and power are more important than raw performance. To achieve our form factor, the transmitter is handheld and the receiver is a larger fixed terminal. We envisage users would bring their transmitters to centrally located receivers and exchange keys which they could use at a later point. Transmitting qubits at 80 MHz, the peak key rate is in excess of 20 kbps. The transmitter device fits within an envelope of <150 ml, weighs 65 g and consumes 3.15 W of power.


Cryptography ◽  
2017 ◽  
Vol 1 (3) ◽  
pp. 18 ◽  
Author(s):  
Anton Pljonkin ◽  
Konstantin Rumyantsev ◽  
Pradeep Singh

2017 ◽  
Vol 25 (17) ◽  
pp. 20045 ◽  
Author(s):  
Heasin Ko ◽  
Byung-Seok Choi ◽  
Joong-Seon Choe ◽  
Kap-Joong Kim ◽  
Jong-Hoi Kim ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document