6,054 research outputs found

    Trusted Noise in Continuous-Variable Quantum Key Distribution: a Threat and a Defense

    Full text link
    We address the role of the phase-insensitive trusted preparation and detection noise in the security of a continuous-variable quantum key distribution, considering the Gaussian protocols on the basis of coherent and squeezed states and studying them in the conditions of Gaussian lossy and noisy channels. The influence of such a noise on the security of Gaussian quantum cryptography can be crucial, even despite the fact that a noise is trusted, due to a strongly nonlinear behavior of the quantum entropies involved in the security analysis. We recapitulate the known effect of the preparation noise in both direct and reverse-reconciliation protocols, as well as the detection noise in the reverse-reconciliation scenario. As a new result, we show the negative role of the trusted detection noise in the direct-reconciliation scheme. We also describe the role of the trusted preparation or detection noise added at the reference side of the protocols in improving the robustness of the protocols to the channel noise, confirming the positive effect for the coherent-state reverse-reconciliation protocol. Finally, we address the combined effect of trusted noise added both in the source and the detector.Comment: 25 pages, 9 figure

    General treatment of Gaussian trusted noise in continuous variable quantum key distribution

    Full text link
    Continuous Variable (CV) quantum key distribution (QKD) is a promising candidate for practical implementations due to its compatibility with the existing communication technology. A trusted device scenario assuming that an adversary has no access to imperfections such as electronic noises in the detector is expected to provide significant improvement in the key rate, but such an endeavor so far was made separately for specific protocols and for specific proof techniques. Here, we develop a simple and general treatment that can incorporate the effects of Gaussian trusted noises for any protocol that uses homodyne/heterodyne measurements. In our method, a rescaling of the outcome of a noisy homodyne/heterodyne detector renders it equivalent to the outcome of a noiseless detector with a tiny additional loss, thanks to a noise-loss equivalence well-known in quantum optics. Since this method is independent of protocols and security proofs, it is applicable to Gaussian-modulation and discrete-modulation protocols, to the finite-size regime, and to any proof techniques developed so far and yet to be discovered as well.Comment: 7 pages, 4 figure

    Receiver Calibration and Quantum Random Number Generation for Continuous-variable Quantum Key Distribution

    Get PDF
    The desire for secure communications and the advent of quantum computing has spurred innovation into key-distribution technologies that are secure against future quantum computers. Computationally secure solutions based on post quantum algorithms and physically-secure solutions using either discrete-variable or continuous-variable quantum key distribution (CV-QKD) have been proposed. The attraction with CV-QKD systems in particular is the potential to leverage the vast knowledge base and access scaling benefits of photonic integration for conventional coherent optical communication for key distribution. CV-QKD requires detailed characterization of coherent receiver hardware, specifically noise generated by electronics and shot noise caused by the local oscillator (LO) laser. This work investigates the temporal stability of the receiver noise power which defines the amount of trusted noise in the quantum link used to compute the secret key rate (SKR). Depending on the noise power’s stability, this characterization must be repeated often, typically in the order of seconds. Therefore, this work explores the possibility of using the shot noise measurement as a source of quantum random numbers, which is required by a CV-QKD transceiver. This work enables further integration of the CV-QKD hardware, removing the need for a separate quantum random number generator (QRNG)

    Modulation leakage vulnerability in continuous-variable quantum key distribution

    Full text link
    Flaws in the process of modulation, or encoding of key bits in the quadratures of the electromagnetic light field, can make continuous-variable quantum key distribution systems susceptible to leakage of secret information. Here, we report such a modulation leakage vulnerability in a system that uses an optical in-phase and quadrature modulator to implement a single sideband encoding scheme. The leakage arises from the limited suppression of a quantum-information-carrying sideband during modulation. Based on the results from a proof-of-concept experiment, we theoretically analyse the impact of this vulnerability. Our results indicate that the leakage reduces the range over which a positive secret key can be obtained, and can even lead to a security breach if not properly taken into account. We also study the effectiveness of additional trusted noise as a countermeasure to this vulnerability.Comment: 12 pages, 6 figure
    • …
    corecore