25 research outputs found
Field test of a practical secure communication network with decoy-state quantum cryptography
We present a secure network communication system that operated with
decoy-state quantum cryptography in a real-world application scenario. The full
key exchange and application protocols were performed in real time among three
nodes, in which two adjacent nodes were connected by approximate 20 km of
commercial telecom optical fiber. The generated quantum keys were immediately
employed and demonstrated for communication applications, including unbreakable
real-time voice telephone between any two of the three communication nodes, or
a broadcast from one node to the other two nodes by using one-time pad
encryption.Comment: 10 pages, 2 figures, 2 tables, typos correcte
Unconditional security at a low cost
By simulating four quantum key distribution (QKD) experiments and analyzing
one decoy-state QKD experiment, we compare two data post-processing schemes
based on security against individual attack by L\"{u}tkenhaus, and
unconditional security analysis by Gottesman-Lo-L\"{u}tkenhaus-Preskill. Our
results show that these two schemes yield close performances. Since the Holy
Grail of QKD is its unconditional security, we conclude that one is better off
considering unconditional security, rather than restricting to individual
attacks.Comment: Accepted by International Conference on Quantum Foundation and
Technology: Frontier and Future 2006 (ICQFT'06
Practical long-distance quantum key distribution system using decoy levels
Quantum key distribution (QKD) has the potential for widespread real-world
applications. To date no secure long-distance experiment has demonstrated the
truly practical operation needed to move QKD from the laboratory to the real
world due largely to limitations in synchronization and poor detector
performance. Here we report results obtained using a fully automated, robust
QKD system based on the Bennett Brassard 1984 protocol (BB84) with low-noise
superconducting nanowire single-photon detectors (SNSPDs) and decoy levels.
Secret key is produced with unconditional security over a record 144.3 km of
optical fibre, an increase of more than a factor of five compared to the
previous record for unconditionally secure key generation in a practical QKD
system.Comment: 9 page
-Symmetric Quantum State Discrimination for Attack on BB84 Quantum Key Distribution
Quantum Key Distribution or QKD provides symmetric key distribution using the
quantum mechanics/channels with new security properties. The security of QKD
relies on the difficulty of the quantum state discrimination problem. We
discover that the recent developments in symmetry can be used to
expedite the quantum state discrimination problem and therefore to attack the
BB84 QKD scheme. We analyze the security of the BB84 scheme and show that the
attack significantly increases the eavesdropping success rate over the previous
Hermitian quantum state discrimination approach. We design and analyze the
approaches to attack BB84 QKD protocol exploiting an extra degree of freedom
provided by the -symmetric quantum mechanics
Security Analysis of an Untrusted Source for Quantum Key Distribution: Passive Approach
We present a passive approach to the security analysis of quantum key
distribution (QKD) with an untrusted source. A complete proof of its
unconditional security is also presented. This scheme has significant
advantages in real-life implementations as it does not require fast optical
switching or a quantum random number generator. The essential idea is to use a
beam splitter to split each input pulse. We show that we can characterize the
source using a cross-estimate technique without active routing of each pulse.
We have derived analytical expressions for the passive estimation scheme.
Moreover, using simulations, we have considered four real-life imperfections:
Additional loss introduced by the "plug & play" structure, inefficiency of the
intensity monitor, noise of the intensity monitor, and statistical fluctuation
introduced by finite data size. Our simulation results show that the passive
estimate of an untrusted source remains useful in practice, despite these four
imperfections. Also, we have performed preliminary experiments, confirming the
utility of our proposal in real-life applications. Our proposal makes it
possible to implement the "plug & play" QKD with the security guaranteed, while
keeping the implementation practical.Comment: 35 pages, 19 figures. Published Versio
Security of Plug-and-Play QKD Arrangements with Finite Resources
The security of a passive plug-and-play QKD arrangement in the case of finite
(resources) key lengths is analysed. It is assumed that the eavesdropper has
full access to the channel so an unknown and untrusted source is assumed. To
take into account the security of the BB84 protocol under collective attacks
within the framework of quantum adversaries, a full treatment provides the
well-known equations for the secure key rate. A numerical simulation keeping a
minimum number of initial parameters constant as the total error sought and the
number of pulses is carried out. The remaining parameters are optimized to
produce the maximum secure key rate. Two main strategies are addressed: with
and without two-decoy-states including the optimization of signal to decoy
relationship
Weak+Vacuum and One Decoy State with Two Way Quantum Key Distribution Protocol
We present relevant bounds for the case of weak+vacuum decoy state and one
decoy state for a two way four states Quantum Key Distribution (QKD) protocol.
The numerical simulation result was significant given that an improvement in
maximum secure distance of nearly double is achieved