-
Implementation security in quantum key distribution
Authors:
Víctor Zapatero,
Álvaro Navarrete,
Marcos Curty
Abstract:
The problem of implementation security in quantum key distribution (QKD) refers to the difficulty of meeting the requirements of mathematical security proofs in real-life QKD systems. Here, we provide a succint review on this topic, focusing on discrete variable QKD setups. Particularly, we discuss some of their main vulnerabilities and comment on possible approaches to overcome them.
The problem of implementation security in quantum key distribution (QKD) refers to the difficulty of meeting the requirements of mathematical security proofs in real-life QKD systems. Here, we provide a succint review on this topic, focusing on discrete variable QKD setups. Particularly, we discuss some of their main vulnerabilities and comment on possible approaches to overcome them.
△ Less
Submitted 31 October, 2023;
originally announced October 2023.
-
Finite-key security of passive quantum key distribution
Authors:
Víctor Zapatero,
Marcos Curty
Abstract:
The passive approach to quantum key distribution (QKD) consists of eliminating all optical modulators and random number generators from QKD systems, in so reaching an enhanced simplicity, immunity to modulator side channels, and potentially higher repetition rates. In this work, we provide finite-key security bounds for a fully passive decoy-state BB84 protocol, considering a passive QKD source re…
▽ More
The passive approach to quantum key distribution (QKD) consists of eliminating all optical modulators and random number generators from QKD systems, in so reaching an enhanced simplicity, immunity to modulator side channels, and potentially higher repetition rates. In this work, we provide finite-key security bounds for a fully passive decoy-state BB84 protocol, considering a passive QKD source recently presented. With our analysis, the attainable secret key rate is comparable to that of the perfect parameter estimation limit, in fact differing from the key rate of the active approach by less than one order of magnitude. This demonstrates the practicality of fully passive QKD solutions.
△ Less
Submitted 4 August, 2023;
originally announced August 2023.
-
Experimental demonstration of fully passive quantum key distribution
Authors:
Feng-Yu Lu,
Ze-Hao Wang,
Víctor Zapatero,
Jia-Lin Chen,
Shuang Wang,
Zhen-Qiang Yin,
Marcos Curty,
De-Yong He,
Rong Wang,
Wei Chen,
Guan-Jie Fan-Yuan,
Guang-Can Guo,
Zheng-Fu Han
Abstract:
The passive approach to quantum key distribution (QKD) consists of removing all active modulation from the users' devices, a highly desirable countermeasure to get rid of modulator side-channels. Nevertheless, active modulation has not been completely removed in QKD systems so far, due to both theoretical and practical limitations. In this work, we present a fully passive time-bin encoding QKD sys…
▽ More
The passive approach to quantum key distribution (QKD) consists of removing all active modulation from the users' devices, a highly desirable countermeasure to get rid of modulator side-channels. Nevertheless, active modulation has not been completely removed in QKD systems so far, due to both theoretical and practical limitations. In this work, we present a fully passive time-bin encoding QKD system and report on the successful implementation of a modulator-free QKD link. According to the latest theoretical analysis, our prototype is capable of delivering competitive secret key rates in the finite key regime.
△ Less
Submitted 7 August, 2023; v1 submitted 23 April, 2023;
originally announced April 2023.
-
Advances in device-independent quantum key distribution
Authors:
Víctor Zapatero,
Tim van Leent,
Rotem Arnon-Friedman,
Wen-Zhao Liu,
Qiang Zhang,
Harald Weinfurter,
Marcos Curty
Abstract:
Device-independent quantum key distribution (DI-QKD) provides the gold standard for secure key exchange. Not only it allows for information-theoretic security based on quantum mechanics, but it relaxes the need to physically model the devices, hence fundamentally ruling out many quantum hacking threats to which non-DI QKD systems are vulnerable. In practice though, DI-QKD is very challenging. It r…
▽ More
Device-independent quantum key distribution (DI-QKD) provides the gold standard for secure key exchange. Not only it allows for information-theoretic security based on quantum mechanics, but it relaxes the need to physically model the devices, hence fundamentally ruling out many quantum hacking threats to which non-DI QKD systems are vulnerable. In practice though, DI-QKD is very challenging. It relies on the loophole-free violation of a Bell inequality, a task that requires high quality entanglement to be distributed between distant parties and close to perfect quantum measurements, which is hardly achievable with current technology. Notwithstanding, recent theoretical and experimental efforts have led to the first proof-of-principle DI-QKD implementations. In this article, we review the state-of-the-art of DI-QKD by highlighting its main theoretical and experimental achievements, discussing the recent proof-of-principle demonstrations, and emphasizing the existing challenges in the field.
△ Less
Submitted 26 August, 2022;
originally announced August 2022.
-
A fully passive transmitter for decoy-state quantum key distribution
Authors:
Víctor Zapatero,
Wenyuan Wang,
Marcos Curty
Abstract:
A passive quantum key distribution (QKD) transmitter generates the quantum states prescribed by a QKD protocol at random, combining a fixed quantum mechanism and a post-selection step. By avoiding the use of active optical modulators externally driven by random number generators, passive QKD transmitters offer immunity to modulator side channels and potentially enable higher frequencies of operati…
▽ More
A passive quantum key distribution (QKD) transmitter generates the quantum states prescribed by a QKD protocol at random, combining a fixed quantum mechanism and a post-selection step. By avoiding the use of active optical modulators externally driven by random number generators, passive QKD transmitters offer immunity to modulator side channels and potentially enable higher frequencies of operation. Recently, the first linear optics setup suitable for passive decoy-state QKD has been proposed. In this work, we simplify the prototype and adopt sharply different approaches for BB84 polarization encoding and decoy-state generation. On top of it, we elaborate a tight custom-made security analysis surpassing an unnecessary assumption and a post-selection step that are central to the former proposal.
△ Less
Submitted 2 November, 2023; v1 submitted 26 August, 2022;
originally announced August 2022.
-
Fully-Passive Quantum Key Distribution
Authors:
Wenyuan Wang,
Rong Wang,
Victor Zapatero,
Li Qian,
Bing Qi,
Marcos Curty,
Hoi-Kwong Lo
Abstract:
Passive implementations of quantum key distribution (QKD) sources are highly desirable as they eliminate side-channels that active modulators might introduce. Up till now, passive decoy-state and passive encoding BB84 schemes have both been proposed. Nonetheless, passive decoy-state generation and passive encoding have never been simultaneously implemented with linear optical elements before, whic…
▽ More
Passive implementations of quantum key distribution (QKD) sources are highly desirable as they eliminate side-channels that active modulators might introduce. Up till now, passive decoy-state and passive encoding BB84 schemes have both been proposed. Nonetheless, passive decoy-state generation and passive encoding have never been simultaneously implemented with linear optical elements before, which greatly limits the practicality of such passive QKD schemes. In this work, we overcome this limitation and propose a fully-passive QKD source with linear optics that eliminates active modulators for both decoy-state choice and encoding. This allows for highly practical QKD systems that avoid side-channels from the source modulators. The passive source we propose (combined with the decoy-state analysis) can create any arbitrary state on a qubit system and is protocol-independent. That is, it can be used for various protocols such as BB84, reference-frame-independent QKD, or the six-state protocol. It can also in principle be combined with e.g. measurement-device-independent QKD, to build a system without side-channels in either detectors or modulators.
△ Less
Submitted 12 July, 2022;
originally announced July 2022.
-
Security of decoy-state quantum key distribution with correlated intensity fluctuations
Authors:
Xoel Sixto,
Víctor Zapatero,
Marcos Curty
Abstract:
One of the most prominent techniques to enhance the performance of practical quantum key distribution (QKD) systems with laser sources is the decoy-state method. Current decoy-state QKD setups operate at GHz repetition rates, a regime where memory effects in the modulators and electronics that control them create correlations between the intensities of the emitted pulses. This translates into info…
▽ More
One of the most prominent techniques to enhance the performance of practical quantum key distribution (QKD) systems with laser sources is the decoy-state method. Current decoy-state QKD setups operate at GHz repetition rates, a regime where memory effects in the modulators and electronics that control them create correlations between the intensities of the emitted pulses. This translates into information leakage about the selected intensities, which cripples a crucial premise of the decoy-state method, thus invalidating the use of standard security analyses. To overcome this problem, a novel security proof that exploits the Cauchy-Schwarz constraint has been introduced recently. Its main drawback is, however, that the achievable key rate is significantly lower than that of the ideal scenario without intensity correlations. Here, we improve this security proof technique by combining it with a fine-grained decoy-state analysis, which can deliver a tight estimation of the relevant parameters that determine the secret key rate. This results in a notable performance enhancement, being now the attainable distance double than that of previous analyses for certain parameter regimes. Also, we show that when the probability density function of the intensity fluctuations, conditioned on the current and previous intensity choices, is known, our approach provides a key rate very similar to the ideal scenario, which highlights the importance of an accurate experimental characterization of the correlations.
△ Less
Submitted 5 July, 2022; v1 submitted 14 June, 2022;
originally announced June 2022.
-
Security of quantum key distribution with intensity correlations
Authors:
Víctor Zapatero,
Álvaro Navarrete,
Kiyoshi Tamaki,
Marcos Curty
Abstract:
The decoy-state method in quantum key distribution (QKD) is a popular technique to approximately achieve the performance of ideal single-photon sources by means of simpler and practical laser sources. In high-speed decoy-state QKD systems, however, intensity correlations between succeeding pulses leak information about the users' intensity settings, thus invalidating a key assumption of this appro…
▽ More
The decoy-state method in quantum key distribution (QKD) is a popular technique to approximately achieve the performance of ideal single-photon sources by means of simpler and practical laser sources. In high-speed decoy-state QKD systems, however, intensity correlations between succeeding pulses leak information about the users' intensity settings, thus invalidating a key assumption of this approach. Here, we solve this pressing problem by develo** a general technique to incorporate arbitrary intensity correlations to the security analysis of decoy-state QKD. This technique only requires to experimentally quantify two main parameters: the correlation range and the maximum relative deviation between the selected and the actually emitted intensities. As a side contribution, we provide a non-standard derivation of the asymptotic secret key rate formula from the non-asymptotic one, in so revealing a necessary condition for the significance of the former.
△ Less
Submitted 3 December, 2021; v1 submitted 24 May, 2021;
originally announced May 2021.
-
Secure quantum key distribution with a subset of malicious devices
Authors:
Víctor Zapatero,
Marcos Curty
Abstract:
The malicious manipulation of quantum key distribution (QKD) hardware is a serious threat to its security, as, typically, neither end users nor QKD manufacturers can validate the integrity of every component of their QKD system in practice. One possible approach to re-establish the security of QKD is to use a redundant number of devices. Following this idea, we introduce an efficient distributed Q…
▽ More
The malicious manipulation of quantum key distribution (QKD) hardware is a serious threat to its security, as, typically, neither end users nor QKD manufacturers can validate the integrity of every component of their QKD system in practice. One possible approach to re-establish the security of QKD is to use a redundant number of devices. Following this idea, we introduce an efficient distributed QKD post-processing protocol and prove its security in a variety of corruption models of the possibly malicious devices. We find that, compared to the most conservative model of active and collaborative corrupted devices, natural assumptions lead to a significant enhancement of the secret key rate and considerably simpler QKD setups. Furthermore, we show that, for most practical situations, the resulting finite-size secret key rate is similar to that of the standard scenario assuming trusted devices.
△ Less
Submitted 5 February, 2021; v1 submitted 25 June, 2020;
originally announced June 2020.
-
Experimental quantum key distribution secure against malicious devices
Authors:
Wei Li,
Victor Zapatero,
Hao Tan,
Ke** Wei,
Hao Min,
Wei-Yue Liu,
Xiao Jiang,
Sheng-Kai Liao,
Cheng-Zhi Peng,
Marcos Curty,
Feihu Xu,
Jian-Wei Pan
Abstract:
The fabrication of quantum key distribution (QKD) systems typically involves several parties, thus providing Eve with multiple opportunities to meddle with the devices. As a consequence, conventional hardware and/or software hacking attacks pose natural threats to the security of practical QKD. Fortunately, if the number of corrupted devices is limited, the security can be restored by using redund…
▽ More
The fabrication of quantum key distribution (QKD) systems typically involves several parties, thus providing Eve with multiple opportunities to meddle with the devices. As a consequence, conventional hardware and/or software hacking attacks pose natural threats to the security of practical QKD. Fortunately, if the number of corrupted devices is limited, the security can be restored by using redundant apparatuses. Here, we report on the demonstration of a secure QKD setup with optical devices and classical post-processing units possibly controlled by an eavesdropper. We implement a 1.25 GHz chip-based measurement-device-independent QKD system secure against malicious devices on \emph{both} the measurement and the users' sides. The secret key rate reaches 137 bps over a 24 dB channel loss. Our setup, benefiting from high clock rate, miniaturized transmitters and a cost-effective structure, provides a promising solution for widespread applications requiring uncompromising communication security.
△ Less
Submitted 23 June, 2020;
originally announced June 2020.
-
Long-distance device-independent quantum key distribution
Authors:
Víctor Zapatero,
Marcos Curty
Abstract:
Besides being a beautiful idea, device-independent quantum key distribution (DIQKD) is probably the ultimate solution to defeat quantum hacking. To guarantee security, it requires, however, that the fair-sampling loophole is closed, which results in a very limited maximum achievable distance. To overcome this limitation, DIQKD must be furnished with fair-sampling devices like, for instance, qubit…
▽ More
Besides being a beautiful idea, device-independent quantum key distribution (DIQKD) is probably the ultimate solution to defeat quantum hacking. To guarantee security, it requires, however, that the fair-sampling loophole is closed, which results in a very limited maximum achievable distance. To overcome this limitation, DIQKD must be furnished with fair-sampling devices like, for instance, qubit amplifiers. These devices can herald the arrival of a photon to the receiver and thus decouple channel loss from the selection of the measurement settings. Consequently, one can safely postselect the heralded events and discard the rest, which results in a significant enhancement of the achievable distance. In this work, we investigate photonic-based DIQKD assisted by two main types of qubit amplifiers in the finite data block size scenario, and study the resources -- particularly, the detection efficiency of the photodetectors and the quality of the entanglement sources -- that would be necessary to achieve long-distance DIQKD within a reasonable time frame of signal transmission.
△ Less
Submitted 9 May, 2019;
originally announced May 2019.