20,983 research outputs found
Analysis of the Security of BB84 by Model Checking
Quantum Cryptography or Quantum key distribution (QKD) is a technique that
allows the secure distribution of a bit string, used as key in cryptographic
protocols. When it was noted that quantum computers could break public key
cryptosystems based on number theory extensive studies have been undertaken on
QKD. Based on quantum mechanics, QKD offers unconditionally secure
communication. Now, the progress of research in this field allows the
anticipation of QKD to be available outside of laboratories within the next few
years. Efforts are made to improve the performance and reliability of the
implemented technologies. But several challenges remain despite this big
progress. The task of how to test the apparatuses of QKD For example did not
yet receive enough attention. These devises become complex and demand a big
verification effort. In this paper we are interested in an approach based on
the technique of probabilistic model checking for studying quantum information.
Precisely, we use the PRISM tool to analyze the security of BB84 protocol and
we are focused on the specific security property of eavesdropping detection. We
show that this property is affected by the parameters of quantum channel and
the power of eavesdropper.Comment: 12 Pages, IJNS
Symbolic Abstractions for Quantum Protocol Verification
Quantum protocols such as the BB84 Quantum Key Distribution protocol exchange
qubits to achieve information-theoretic security guarantees. Many variants
thereof were proposed, some of them being already deployed. Existing security
proofs in that field are mostly tedious, error-prone pen-and-paper proofs of
the core protocol only that rarely account for other crucial components such as
authentication. This calls for formal and automated verification techniques
that exhaustively explore all possible intruder behaviors and that scale well.
The symbolic approach offers rigorous, mathematical frameworks and automated
tools to analyze security protocols. Based on well-designed abstractions, it
has allowed for large-scale formal analyses of real-life protocols such as TLS
1.3 and mobile telephony protocols. Hence a natural question is: Can we use
this successful line of work to analyze quantum protocols? This paper proposes
a first positive answer and motivates further research on this unexplored path
Practical long-distance quantum key distribution system using decoy levels
Quantum key distribution (QKD) has the potential for widespread real-world
applications. To date no secure long-distance experiment has demonstrated the
truly practical operation needed to move QKD from the laboratory to the real
world due largely to limitations in synchronization and poor detector
performance. Here we report results obtained using a fully automated, robust
QKD system based on the Bennett Brassard 1984 protocol (BB84) with low-noise
superconducting nanowire single-photon detectors (SNSPDs) and decoy levels.
Secret key is produced with unconditional security over a record 144.3 km of
optical fibre, an increase of more than a factor of five compared to the
previous record for unconditionally secure key generation in a practical QKD
system.Comment: 9 page
High-dimensional decoy-state quantum key distribution over 0.3 km of multicore telecommunication optical fibers
Multiplexing is a strategy to augment the transmission capacity of a
communication system. It consists of combining multiple signals over the same
data channel and it has been very successful in classical communications.
However, the use of enhanced channels has only reached limited practicality in
quantum communications (QC) as it requires the complex manipulation of quantum
systems of higher dimensions. Considerable effort is being made towards QC
using high-dimensional quantum systems encoded into the transverse momentum of
single photons but, so far, no approach has been proven to be fully compatible
with the existing telecommunication infrastructure. Here, we overcome such a
technological challenge and demonstrate a stable and secure high-dimensional
decoy-state quantum key distribution session over a 0.3 km long multicore
optical fiber. The high-dimensional quantum states are defined in terms of the
multiple core modes available for the photon transmission over the fiber, and
the decoy-state analysis demonstrates that our technique enables a positive
secret key generation rate up to 25 km of fiber propagation. Finally, we show
how our results build up towards a high-dimensional quantum network composed of
free-space and fiber based linksComment: Please see the complementary work arXiv:1610.01812 (2016
- …