• Corpus ID: 248834642

Side-channel-free quantum key distribution with practical devices

@inproceedings{Jiang2022SidechannelfreeQK,
  title={Side-channel-free quantum key distribution with practical devices},
  author={Cong Jiang and Zong-Wen Yu and Xiao-Long Hu and Xiang‐Bin Wang},
  year={2022}
}
Based on the idea that there is no side channel in the vacuum state, the side-channel-free quantum key distribution (SCFQKD) protocol was proposed, which is immune to all attacks in the source side-channel space and all attacks in the detectors. In the original SCFQKD protocol, an important assumption is that Alice and Bob can produce the perfect vacuum pulses. But due to the finite extinction ratio of the intensity modulators, the perfect vacuum pulse is impossible in practice. In this paper… 

Figures and Tables from this paper

References

SHOWING 1-10 OF 21 REFERENCES
Experimental Side-Channel-Secure Quantum Key Distribution.
Quantum key distribution can provide unconditionally secure key exchange for remote users in theory. In practice, however, in most quantum key distribution systems, quantum hackers might steal the
Practical Long-Distance Side-Channel-Free Quantum Key Distribution
Quantum Digital Signatures with Random Pairing
Ji-Qian Qin, Cong Jiang, 2 Yun-Long Yu, and Xiang-Bin Wang 2, 3, 4, 5, ∗ State Key Laboratory of Low Dimensional Quantum Physics, Department of Physics, Tsinghua University, Beijing 100084, China
Composable security for practical quantum key distribution with two way classical communication
TLDR
It is shown that simply applying Chernoff bound in the calculation gives correct key rate, but the failure probability changes a little bit, and the key rates by far breaking the PLOB bound with composable security are calculated.
Sending-or-not-sending twin-field quantum key distribution: Breaking the direct transmission key rate
We present improved method of sending-or-not-sending twin-field quantum key distribution (SNS TF-QKD) based on its structure and the application of error rejection. %And we present iteration formula
Secure quantum key distribution with realistic devices
TLDR
This review gives both sides of the story, with the current best theory of quantum security, and an extensive survey of what makes quantum cryptosystem safe in practice.
Advances in Quantum Cryptography
TLDR
This review begins by reviewing protocols of quantum key distribution based on discrete variable systems, and considers aspects of device independence, satellite challenges, and high rate protocols based on continuous variable systems.
Twin-field quantum key distribution with large misalignment error
TLDR
This paper shows by a concrete eavesdropping scheme that the later phase announcement does have important effects and the traditional formulas of the decoy-state method do not apply to the original protocol, and greatly improves the tolerable threshold of misalignment error in single-photon interference.
Overcoming the rate–distance limit of quantum key distribution without quantum repeaters
TLDR
This work introduces an alternative scheme for QKD whereby pairs of phase-randomized optical fields are first generated at two distant locations and then combined at a central measuring station, enabling a form of quantum key distribution that can exceed the secret-key capacity without using quantum repeaters and that has security independent of the measuring devices.
...
...