95 research outputs found
Provably-secure symmetric private information retrieval with quantum cryptography
Private information retrieval (PIR) is a database query protocol that
provides user privacy, in that the user can learn a particular entry of the
database of his interest but his query would be hidden from the data centre.
Symmetric private information retrieval (SPIR) takes PIR further by
additionally offering database privacy, where the user cannot learn any
additional entries of the database. Unconditionally secure SPIR solutions with
multiple databases are known classically, but are unrealistic because they
require long shared secret keys between the parties for secure communication
and shared randomness in the protocol. Here, we propose using quantum key
distribution (QKD) instead for a practical implementation, which can realise
both the secure communication and shared randomness requirements. We prove that
QKD maintains the security of the SPIR protocol and that it is also secure
against any external eavesdropper. We also show how such a classical-quantum
system could be implemented practically, using the example of a two-database
SPIR protocol with keys generated by measurement device-independent QKD.
Through key rate calculations, we show that such an implementation is feasible
at the metropolitan level with current QKD technology.Comment: 19 page
Bright-light detector control emulates the local bounds of Bell-type inequalities
It is well-known that no local model - in theory - can simulate the outcome
statistics of a Bell-type experiment as long as the detection efficiency is
higher than a threshold value. For the Clauser-Horne-Shimony-Holt (CHSH) Bell
inequality this theoretical threshold value is . On the other hand, Phys.\ Rev.\ Lett.\ 107,
170404 (2011) outlined an explicit practical model that can fake the CHSH
inequality for a detection efficiency of up to . In this work, we close
this gap. More specifically, we propose a method to emulate a Bell inequality
at the threshold detection efficiency using existing optical detector control
techniques. For a Clauser-Horne-Shimony-Holt inequality, it emulates the CHSH
violation predicted by quantum mechanics up to . For the
Garg-Mermin inequality - re-calibrated by incorporating non-detection events -
our method emulates its exact local bound at any efficiency above the
threshold. This confirms that attacks on secure quantum communication protocols
based on Bell violation is a real threat if the detection efficiency loophole
is not closed.Comment: 7 pages, 3 figure
Concise Security Bounds for Practical Decoy-State Quantum Key Distribution
Due to its ability to tolerate high channel loss, decoy-state quantum key
distribution (QKD) has been one of the main focuses within the QKD community.
Notably, several experimental groups have demonstrated that it is secure and
feasible under real-world conditions. Crucially, however, the security and
feasibility claims made by most of these experiments were obtained under the
assumption that the eavesdropper is restricted to particular types of attacks
or that the finite-key effects are neglected. Unfortunately, such assumptions
are not possible to guarantee in practice. In this work, we provide concise and
tight finite-key security bounds for practical decoy-state QKD that are valid
against general attacks.Comment: 5+3 pages and 2 figure
Finite-key security analysis of quantum key distribution with imperfect light sources
In recent years, the gap between theory and practice in quantum key
distribution (QKD) has been significantly narrowed, particularly for QKD
systems with arbitrarily awed optical receivers. The status for QKD systems
with imperfect light sources is however less satisfactory, in the sense that
the resulting secure key rates are often overly-dependent on the quality of
state preparation. This is especially the case when the channel loss is high.
Very recently, to overcome this limitation, Tamaki et al proposed a QKD
protocol based on the so-called rejected data analysis, and showed that its
security|in the limit of infinitely long keys|is almost independent of any
encoding flaw in the qubit space, being this protocol compatible with the decoy
state method. Here, as a step towards practical QKD, we show that a similar
conclusion is reached in the finite-key regime, even when the intensity of the
light source is unstable. More concretely, we derive security bounds for a wide
class of realistic light sources and show that the bounds are also efficient in
the presence of high channel loss. Our results strongly suggest the feasibility
of long distance provably-secure communication with imperfect light sources.Comment: 27 pages, 7 figure
Detector-Device-Independent Quantum Key Distribution
Recently, a quantum key distribution (QKD) scheme based on entanglement
swapping, called measurement-device-independent QKD (mdiQKD), was proposed to
bypass all detector side-channel attacks. While mdiQKD is conceptually elegant
and offers a supreme level of security, the experimental complexity is
challenging for practical systems. For instance, it requires interference
between two widely separated independent single-photon sources, and the rates
are dependent on detecting two photons - one from each source. Here we
experimentally demonstrate a QKD scheme that removes the need for a two-photon
system and instead uses the idea of a two-qubit single-photon (TQSP) to
significantly simplify the implementation and improve the efficiency of mdiQKD
in several aspects.Comment: 5 pages + 3 figure
Loss-tolerant quantum secure positioning with weak laser sources
Quantum position verification (QPV) is the art of verifying the geographical
location of an untrusted party. Recently, it has been shown that the widely
studied Bennett & Brassard 1984 (BB84) QPV protocol is insecure after the 3 dB
loss point assuming local operations and classical communication (LOCC)
adversaries. Here, we propose a time-reversed entanglement swapping QPV
protocol (based on measurement-device-independent quantum cryptography) that is
highly robust against quantum channel loss. First, assuming ideal qubit
sources, we show that the protocol is secure against LOCC adversaries for any
quantum channel loss, thereby overcoming the 3 dB loss limit. Then, we analyze
the security of the protocol in a more practical setting involving weak laser
sources and linear optics. In this setting, we find that the security only
degrades by an additive constant and the protocol is able to verify positions
up to 47 dB channel loss.Comment: 11 pages, 3 figures. Partially based on an earlier work in
arXiv:1510.0489
- …