Papers
Topics
Authors
Recent
Search
2000 character limit reached

Enhancing key rates of QKD protocol by Coincidence Detection

Published 29 Feb 2024 in quant-ph | (2402.19049v3)

Abstract: In theory, quantum key distribution (QKD) provides unconditional security; however, its practical implementations are susceptible to exploitable vulnerabilities. This investigation tackles the constraints in practical QKD implementations using weak coherent pulses. We improve on the conventional approach of using decoy pulses by integrating it with the coincidence detection (CD) protocol. Additionally, we introduce an easy-to-implement algorithm to compute asymptotic key rates for the protocol. Furthermore, we have carried out an experimental implementation of the protocol, where we demonstrate that monitoring coincidences in the decoy state protocol leads to enhanced key rates under realistic experimental conditions.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (47)
  1. Quantum cryptography: Public key distribution and coin tossing. Theoretical Computer Science, 560(P1):7–11, dec 2014.
  2. Ekert. Quantum cryptography based on Bell’s theorem. Physical review letters, 67 6:661–663, 1991.
  3. Quantum cryptography without Bell’s theorem. Physical Review Letters, 68(5):557–559, feb 1992.
  4. Differential Phase Shift Quantum Key Distribution. Physical Review Letters, 89(3):037902, jun 2002.
  5. Fast and simple one-way quantum key distribution. Applied Physics Letters, 87(19):1–3, nov 2005.
  6. Measurement-device-independent quantum key distribution. Phys. Rev. Lett., 108:130503, Mar 2012.
  7. Overcoming the rate–distance limit of quantum key distribution without quantum repeaters. Nature, 557(7705):400–403, May 2018.
  8. Unconditional Security of Quantum Key Distribution over Arbitrarily Long Distances. Science, 283(5410):2050–2056, mar 1999.
  9. Simple Proof of Security of the BB84 Quantum Key Distribution Protocol. Physical Review Letters, 85(2):441–444, jul 2000.
  10. Dominic Mayers. Unconditional security in quantum cryptography. Journal of the ACM, 48(3):351–406, 2001.
  11. Information gain in quantum eavesdropping. Journal of Modern Optics, 41(12):2455–2466, 1994.
  12. Limitations on Practical Quantum Cryptography. Physical Review Letters, 85(6):1330–1333, aug 2000.
  13. Large pulse attack as a method of conventional optical eavesdropping in quantum cryptography. Journal of Modern Optics, 48(13):2023–2038, nov 2001.
  14. Vadim Makarov * and Dag R. Hjelme. Faked states attack on quantum cryptosystems. Journal of Modern Optics, 52(5):691–705, mar 2005.
  15. Trojan-horse attacks on quantum-key-distribution systems. Physical Review A, 73(2):022320, feb 2006.
  16. Hacking commercial quantum cryptography systems by tailored bright illumination. Nature Photonics, 4(10):686–689, oct 2010.
  17. Device Calibration Impacts Security of Quantum Key Distribution. Physical Review Letters, 107(11):110501, sep 2011.
  18. Experimental side channel analysis of bb84 qkd source. IEEE Journal of Quantum Electronics, 57(6):1–7, 2021.
  19. Norbert Lütkenhaus. Security against individual attacks for realistic quantum key distribution. Physical Review A, 61(5):052304, apr 2000.
  20. Security of quantum key distribution with imperfect devices. In International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings., pages 135–135. IEEE, 2004.
  21. Unconditional security of practical quantum key distribution. The European Physical Journal D, 41(3):599–627, mar 2007.
  22. Won Young Hwang. Quantum Key Distribution with High Loss: Toward Global Secure Communication. Physical Review Letters, 91(5):057901, aug 2003.
  23. Decoy State Quantum Key Distribution. Physical Review Letters, 94(23):230504, jun 2005.
  24. Xiang-Bin Wang. Beating the Photon-Number-Splitting Attack in Practical Quantum Cryptography. Physical Review Letters, 94(23):230503, jun 2005.
  25. Practical decoy state for quantum key distribution. Physical Review A, 72(1):012326, jul 2005.
  26. AndrÉ Stefanov StÉPhane Félix, Nicolas Gisin and Hugo Zbinden. Faint laser quantum key distribution: Eavesdropping exploiting multiphoton pulses. Journal of Modern Optics, 48(13):2009–2021, 2001.
  27. Quantum key distribution with multiphoton pulses: an advantage. Optics Continuum, 1(1):68, January 2022.
  28. Security analysis of quantum key distribution on passive optical networks. Opt. Express, 25(10):11894–11909, May 2017.
  29. Quantum key distribution with realistic states: photon-number statistics in the photon-number splitting attack. New Journal of Physics, 4(1):44, jul 2002.
  30. Modified bb84 quantum key distribution protocol robust to source imperfections. Phys. Rev. Res., 5:023065, Apr 2023.
  31. Imperfect phase-randomisation and generalised decoy-state quantum key distribution. arXiv preprint arXiv:2304.09401, 2023.
  32. Security of decoy-state quantum key distribution with correlated intensity fluctuations. Physical Review Applied, 18(4):044069, 2022.
  33. Security of quantum key distribution with intensity correlations. Quantum, 5:602, 2021.
  34. Quantum key distribution rates from semidefinite programming. Quantum, 7:1019, 2023.
  35. Numerical finite-key analysis of quantum key distribution. npj Quantum Information, 6(1):104, 2020.
  36. Numerical approach for unstructured quantum key distribution. Nature communications, 7(1):11712, 2016.
  37. Numerical calculations of the finite key rate for general quantum key distribution protocols. Physical Review Research, 3(1):013274, 2021.
  38. Improved device-independent randomness expansion rates using two sided randomness. New Journal of Physics, 2023.
  39. Rutvij Bhavsar. Improvements on device independent and semi-device independent protocols of randomness expansion. arXiv preprint arXiv:2311.13528, 2023.
  40. Peter Wittek. Algorithm 950: Ncpol2sdpa—sparse semidefinite programming relaxations for polynomial optimization problems of noncommuting variables. ACM Transactions on Mathematical Software (TOMS), 41(3):1–12, 2015.
  41. Generalised entropy accumulation. In 2022 IEEE 63rd Annual Symposium on Foundations of Computer Science (FOCS), pages 844–850. IEEE, 2022.
  42. Security of quantum key distribution from generalised entropy accumulation. Nature Communications, 14(1):5272, 2023.
  43. Mitigating the source-side channel vulnerability by characterisation of photon statistics. Journal of Lightwave Technology, pages 1–7, 2024.
  44. Mark Fox. Quantum optics: an introduction. Number 15 in Oxford master series in physics. Oxford University Press, Oxford ; New York, 2006.
  45. Hamza Fawzi. Semidefinite programming in quantum information. Advanced School on Optimization Methods in Quantum Information, 2023. Lecture series at ICMAT. See https://www.damtp.cam.ac.uk/user/hf323/qip2021_tutorial.html for slides.
  46. Semidefinite programming relaxations for quantum correlations. arXiv preprint arXiv:2307.02551, 2023.
  47. MOSEK ApS. The MOSEK optimization toolbox for MATLAB manual. Version 9.0., 2019.

Summary

No one has generated a summary of this paper yet.

Paper to Video (Beta)

No one has generated a video about this paper yet.

Whiteboard

No one has generated a whiteboard explanation for this paper yet.

Open Problems

We haven't generated a list of open problems mentioned in this paper yet.

Continue Learning

We haven't generated follow-up questions for this paper yet.

Collections

Sign up for free to add this paper to one or more collections.

Tweets

Sign up for free to view the 2 tweets with 3 likes about this paper.