Skip to main content

Showing 1–11 of 11 results for author: Zapatero, V

.
  1. arXiv:2310.20377  [pdf, other

    quant-ph

    Implementation security in quantum key distribution

    Authors: Víctor Zapatero, Álvaro Navarrete, Marcos Curty

    Abstract: The problem of implementation security in quantum key distribution (QKD) refers to the difficulty of meeting the requirements of mathematical security proofs in real-life QKD systems. Here, we provide a succint review on this topic, focusing on discrete variable QKD setups. Particularly, we discuss some of their main vulnerabilities and comment on possible approaches to overcome them.

    Submitted 31 October, 2023; originally announced October 2023.

    Comments: Submitted to Advanced Quantum Technologies

  2. arXiv:2308.02376  [pdf, other

    quant-ph

    Finite-key security of passive quantum key distribution

    Authors: Víctor Zapatero, Marcos Curty

    Abstract: The passive approach to quantum key distribution (QKD) consists of eliminating all optical modulators and random number generators from QKD systems, in so reaching an enhanced simplicity, immunity to modulator side channels, and potentially higher repetition rates. In this work, we provide finite-key security bounds for a fully passive decoy-state BB84 protocol, considering a passive QKD source re… ▽ More

    Submitted 4 August, 2023; originally announced August 2023.

  3. arXiv:2304.11655  [pdf, other

    quant-ph

    Experimental demonstration of fully passive quantum key distribution

    Authors: Feng-Yu Lu, Ze-Hao Wang, Víctor Zapatero, Jia-Lin Chen, Shuang Wang, Zhen-Qiang Yin, Marcos Curty, De-Yong He, Rong Wang, Wei Chen, Guan-Jie Fan-Yuan, Guang-Can Guo, Zheng-Fu Han

    Abstract: The passive approach to quantum key distribution (QKD) consists of removing all active modulation from the users' devices, a highly desirable countermeasure to get rid of modulator side-channels. Nevertheless, active modulation has not been completely removed in QKD systems so far, due to both theoretical and practical limitations. In this work, we present a fully passive time-bin encoding QKD sys… ▽ More

    Submitted 7 August, 2023; v1 submitted 23 April, 2023; originally announced April 2023.

    Comments: 13 pages, 5 figures

  4. Advances in device-independent quantum key distribution

    Authors: Víctor Zapatero, Tim van Leent, Rotem Arnon-Friedman, Wen-Zhao Liu, Qiang Zhang, Harald Weinfurter, Marcos Curty

    Abstract: Device-independent quantum key distribution (DI-QKD) provides the gold standard for secure key exchange. Not only it allows for information-theoretic security based on quantum mechanics, but it relaxes the need to physically model the devices, hence fundamentally ruling out many quantum hacking threats to which non-DI QKD systems are vulnerable. In practice though, DI-QKD is very challenging. It r… ▽ More

    Submitted 26 August, 2022; originally announced August 2022.

    Journal ref: npj Quantum Information 9, 10 (2023)

  5. A fully passive transmitter for decoy-state quantum key distribution

    Authors: Víctor Zapatero, Wenyuan Wang, Marcos Curty

    Abstract: A passive quantum key distribution (QKD) transmitter generates the quantum states prescribed by a QKD protocol at random, combining a fixed quantum mechanism and a post-selection step. By avoiding the use of active optical modulators externally driven by random number generators, passive QKD transmitters offer immunity to modulator side channels and potentially enable higher frequencies of operati… ▽ More

    Submitted 2 November, 2023; v1 submitted 26 August, 2022; originally announced August 2022.

    Journal ref: Quantum Science and Technology 8, 025014 (2023)

  6. Fully-Passive Quantum Key Distribution

    Authors: Wenyuan Wang, Rong Wang, Victor Zapatero, Li Qian, Bing Qi, Marcos Curty, Hoi-Kwong Lo

    Abstract: Passive implementations of quantum key distribution (QKD) sources are highly desirable as they eliminate side-channels that active modulators might introduce. Up till now, passive decoy-state and passive encoding BB84 schemes have both been proposed. Nonetheless, passive decoy-state generation and passive encoding have never been simultaneously implemented with linear optical elements before, whic… ▽ More

    Submitted 12 July, 2022; originally announced July 2022.

  7. Security of decoy-state quantum key distribution with correlated intensity fluctuations

    Authors: Xoel Sixto, Víctor Zapatero, Marcos Curty

    Abstract: One of the most prominent techniques to enhance the performance of practical quantum key distribution (QKD) systems with laser sources is the decoy-state method. Current decoy-state QKD setups operate at GHz repetition rates, a regime where memory effects in the modulators and electronics that control them create correlations between the intensities of the emitted pulses. This translates into info… ▽ More

    Submitted 5 July, 2022; v1 submitted 14 June, 2022; originally announced June 2022.

    Comments: 19 pages, 6 figures

    Journal ref: Phys. Rev. Applied 18, 044069 (2022)

  8. Security of quantum key distribution with intensity correlations

    Authors: Víctor Zapatero, Álvaro Navarrete, Kiyoshi Tamaki, Marcos Curty

    Abstract: The decoy-state method in quantum key distribution (QKD) is a popular technique to approximately achieve the performance of ideal single-photon sources by means of simpler and practical laser sources. In high-speed decoy-state QKD systems, however, intensity correlations between succeeding pulses leak information about the users' intensity settings, thus invalidating a key assumption of this appro… ▽ More

    Submitted 3 December, 2021; v1 submitted 24 May, 2021; originally announced May 2021.

    Comments: 21 pages, 4 figures

    Journal ref: Quantum 5, 602 (2021)

  9. Secure quantum key distribution with a subset of malicious devices

    Authors: Víctor Zapatero, Marcos Curty

    Abstract: The malicious manipulation of quantum key distribution (QKD) hardware is a serious threat to its security, as, typically, neither end users nor QKD manufacturers can validate the integrity of every component of their QKD system in practice. One possible approach to re-establish the security of QKD is to use a redundant number of devices. Following this idea, we introduce an efficient distributed Q… ▽ More

    Submitted 5 February, 2021; v1 submitted 25 June, 2020; originally announced June 2020.

    Comments: 35 pages, 6 figures

    Journal ref: npj Quantum Information 7, 26 (2021)

  10. Experimental quantum key distribution secure against malicious devices

    Authors: Wei Li, Victor Zapatero, Hao Tan, Ke** Wei, Hao Min, Wei-Yue Liu, Xiao Jiang, Sheng-Kai Liao, Cheng-Zhi Peng, Marcos Curty, Feihu Xu, Jian-Wei Pan

    Abstract: The fabrication of quantum key distribution (QKD) systems typically involves several parties, thus providing Eve with multiple opportunities to meddle with the devices. As a consequence, conventional hardware and/or software hacking attacks pose natural threats to the security of practical QKD. Fortunately, if the number of corrupted devices is limited, the security can be restored by using redund… ▽ More

    Submitted 23 June, 2020; originally announced June 2020.

    Comments: 28 pages, 5 figures, 4 tables

    Journal ref: Phys. Rev. Applied 15, 034081 (2021)

  11. Long-distance device-independent quantum key distribution

    Authors: Víctor Zapatero, Marcos Curty

    Abstract: Besides being a beautiful idea, device-independent quantum key distribution (DIQKD) is probably the ultimate solution to defeat quantum hacking. To guarantee security, it requires, however, that the fair-sampling loophole is closed, which results in a very limited maximum achievable distance. To overcome this limitation, DIQKD must be furnished with fair-sampling devices like, for instance, qubit… ▽ More

    Submitted 9 May, 2019; originally announced May 2019.

    Comments: 37 pages, 15 figures

    Journal ref: Scientific Reports 9, 17749 (2019)