Skip to main content

Showing 1–11 of 11 results for author: Currás-Lorenzo, G

.
  1. arXiv:2402.08028  [pdf, other

    quant-ph

    Quantum key distribution with unbounded pulse correlations

    Authors: Margarida Pereira, Guillermo Currás-Lorenzo, Akihiro Mizutani, Davide Rusca, Marcos Curty, Kiyoshi Tamaki

    Abstract: A prevalent issue in practical applications of quantum key distribution (QKD) is the emergence of correlations among the emitted signals. Although recent works have proved the security of QKD in the presence of this imperfection, they rest on the premise that pulse correlations are of finite length. However, this assumption is not necessarily met in practice, since the length of these correlations… ▽ More

    Submitted 12 February, 2024; originally announced February 2024.

  2. arXiv:2305.05930  [pdf, other

    quant-ph

    A security framework for quantum key distribution implementations

    Authors: Guillermo Currás-Lorenzo, Margarida Pereira, Go Kato, Marcos Curty, Kiyoshi Tamaki

    Abstract: Quantum key distribution (QKD) can theoretically achieve the Holy Grail of cryptography, information-theoretic security against eavesdrop**. However, in practice, discrepancies between the mathematical models assumed in security proofs and the actual functioning of the devices used in implementations prevent it from reaching this goal. Since measurement-device-independent QKD guarantees security… ▽ More

    Submitted 10 May, 2023; originally announced May 2023.

    Comments: Main text: 8 pages, 2 figures. Supplementary information: 27 pages, 5 figures

  3. Secret key rate bounds for quantum key distribution with non-uniform phase randomization

    Authors: Xoel Sixto, Guillermo Currás-Lorenzo, Kiyoshi Tamaki, Marcos Curty

    Abstract: Decoy-state quantum key distribution (QKD) is undoubtedly the most efficient solution to handle multi-photon signals emitted by laser sources, and provides the same secret key rate scaling as ideal single-photon sources. It requires, however, that the phase of each emitted pulse is uniformly random. This might be difficult to guarantee in practice, due to inevitable device imperfections and/or the… ▽ More

    Submitted 7 April, 2023; originally announced April 2023.

    Journal ref: EPJ Quantum Technol. 10, 53 (2023)

  4. arXiv:2210.11754  [pdf, other

    quant-ph

    Modified BB84 quantum key distribution protocol robust to source imperfections

    Authors: Margarida Pereira, Guillermo Currás-Lorenzo, Álvaro Navarrete, Akihiro Mizutani, Go Kato, Marcos Curty, Kiyoshi Tamaki

    Abstract: The Bennett-Brassard 1984 (BB84) protocol is the most widely implemented quantum key distribution (QKD) scheme. However, despite enormous theoretical and experimental efforts in the past decades, the security of this protocol with imperfect sources has not yet been rigorously established. In this work, we address this shortcoming and prove the security of the BB84 protocol in the presence of multi… ▽ More

    Submitted 21 October, 2022; originally announced October 2022.

    Journal ref: Phys. Rev. Research 5, 023065 (2023)

  5. Security of quantum key distribution with imperfect phase randomisation

    Authors: Guillermo Currás-Lorenzo, Shlok Nahar, Norbert Lütkenhaus, Kiyoshi Tamaki, Marcos Curty

    Abstract: The performance of quantum key distribution (QKD) is severely limited by multiphoton emissions, due to the photon-number-splitting attack. The most efficient solution, the decoy-state method, requires that the phases of all transmitted pulses are independent and uniformly random. In practice, however, these phases are often correlated, especially in high-speed systems, which opens a security looph… ▽ More

    Submitted 8 January, 2024; v1 submitted 14 October, 2022; originally announced October 2022.

    Comments: 22 pages, 1 figure. v3: Updated to Accepted Manuscript

    Journal ref: Quantum Sci. Technol. 9, 015025 (2024)

  6. Finite-key analysis of loss-tolerant quantum key distribution based on random sampling theory

    Authors: Guillermo Currás-Lorenzo, Álvaro Navarrete, Margarida Pereira, Kiyoshi Tamaki

    Abstract: The core of security proofs of quantum key distribution (QKD) is the estimation of a parameter that determines the amount of privacy amplification that the users need to apply in order to distill a secret key. To estimate this parameter using the observed data, one needs to apply concentration inequalities, such as random sampling theory or Azuma's inequality. The latter can be straightforwardly e… ▽ More

    Submitted 20 October, 2022; v1 submitted 29 January, 2021; originally announced January 2021.

    Comments: 24 pages, 5 figures. v2: Corrected a technical issue; bold math was not displayed properly in Appendix B

    Journal ref: Phys. Rev. A 104, 012406 (2021)

  7. Twin-field quantum key distribution with fully discrete phase randomization

    Authors: Guillermo Currás-Lorenzo, Lewis Wooltorton, Mohsen Razavi

    Abstract: Twin-field (TF) quantum key distribution (QKD) can overcome fundamental secret-key-rate bounds on point-to-point QKD links, allowing us to reach longer distances than ever before. Since its introduction, several TF-QKD variants have been proposed, and some of them have already been implemented experimentally. Most of them assume that the users can emit weak coherent pulses with a continuous random… ▽ More

    Submitted 7 August, 2020; originally announced August 2020.

    Journal ref: Phys. Rev. Applied 15, 014016 (2021)

  8. Finite-key analysis for memory-assisted decoy-state quantum key distribution

    Authors: Guillermo Currás-Lorenzo, Mohsen Razavi

    Abstract: Memory-assisted quantum key distribution (MA-QKD) systems are among novel promising solutions that can improve the key-rate scaling with channel loss. By using a middle node with quantum storage and measurement functionalities, they offer the same key-rate scaling with distance as a single-node quantum repeater. However, the distance at which they can surpass the nominal key rate of repeaterless s… ▽ More

    Submitted 14 September, 2020; v1 submitted 9 May, 2020; originally announced May 2020.

    Comments: 23 pages, 4 figures. v2: Updated to accepted version

    Journal ref: New J. Phys. 22, 103005 (2020)

  9. Tight finite-key security for twin-field quantum key distribution

    Authors: Guillermo Currás-Lorenzo, Alvaro Navarrete, Koji Azuma, Go Kato, Marcos Curty, Mohsen Razavi

    Abstract: Quantum key distribution (QKD) offers a reliable solution to communication problems that require long-term data security. For its widespread use, however, the rate and reach of QKD systems must be improved. Twin-field (TF) QKD is a step forward toward this direction, with early demonstrations suggesting it can beat the current rate-versus-distance records. A recently introduced variant of TF-QKD i… ▽ More

    Submitted 5 March, 2020; v1 submitted 24 October, 2019; originally announced October 2019.

    Comments: 26 pages, 5 figures. v2: major changes on subsection "Concentration inequality for sums of dependent random variables", minor changes elsewhere. v3: Changes on subsection "Concentration inequality for sums of dependent random variables", to use the newest version of the inequality in Ref. [38]. Minor changes in citations elsewhere. v4: Fixed wrong citation numbers in graph legends

    Journal ref: npj Quantum Information 7, 22 (2021)

  10. A trusted-node-free eight-user metropolitan quantum communication network

    Authors: Siddarth Koduru Joshi, Djeylan Aktas, Sören Wengerowsky, Martin Lončarić, Sebastian Philipp Neumann, Bo Liu, Thomas Scheidl, Guillermo Currás-Lorenzo, Željko Samec, Laurent Kling, Alex Qiu, Mohsen Razavi, Mario Stipčević, John G. Rarity, Rupert Ursin

    Abstract: Quantum communication is rapidly gaining popularity due to its high security and technological maturity. However, most implementations are limited to just two communicating parties (users). Quantum communication networks aim to connect a multitude of users. Here we present a fully connected quantum communication network on a city wide scale without active switching or trusted nodes. We demonstrate… ▽ More

    Submitted 11 September, 2020; v1 submitted 18 July, 2019; originally announced July 2019.

    Comments: 16 pages, 9 figures, 3 tables. Corrected typos, updated references

    Journal ref: Science Advances 6, no. 36 (2020): eaba0959

  11. Wavelength Assignment in Quantum Access Networks with Hybrid Wireless-Fiber Links

    Authors: Sima Bahrani, Osama Elmabrok, Guillermo Currás-Lorenzo, Mohsen Razavi

    Abstract: We propose a low-complexity near-optimal wavelength allocation technique for quantum key distribution access networks that rely on wavelength division multiple access. Such networks would allow users to send quantum and classical signals simultaneously on the same optical fiber infrastructure. Users can be connected to the access network via optical wireless or wired links. We account for the back… ▽ More

    Submitted 4 February, 2019; v1 submitted 3 October, 2018; originally announced October 2018.