Secure quantum key distribution with a subset of malicious devices

Abstract The malicious manipulation of quantum key distribution (QKD) hardware is a serious threat to its security, as, typically, neither end users nor QKD manufacturers can validate the integrity of every component of their QKD system in practice. One possible approach to re-establish the security...

Descripción completa

Guardado en:
Detalles Bibliográficos
Autores principales: Víctor Zapatero, Marcos Curty
Formato: article
Lenguaje:EN
Publicado: Nature Portfolio 2021
Materias:
Acceso en línea:https://doaj.org/article/07174a04c1fb47cc888859497bec3adc
Etiquetas: Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
id oai:doaj.org-article:07174a04c1fb47cc888859497bec3adc
record_format dspace
spelling oai:doaj.org-article:07174a04c1fb47cc888859497bec3adc2021-12-02T14:06:53ZSecure quantum key distribution with a subset of malicious devices10.1038/s41534-020-00358-y2056-6387https://doaj.org/article/07174a04c1fb47cc888859497bec3adc2021-02-01T00:00:00Zhttps://doi.org/10.1038/s41534-020-00358-yhttps://doaj.org/toc/2056-6387Abstract The malicious manipulation of quantum key distribution (QKD) hardware is a serious threat to its security, as, typically, neither end users nor QKD manufacturers can validate the integrity of every component of their QKD system in practice. One possible approach to re-establish the security of QKD is to use a redundant number of devices. Following this idea, we address various corruption models of the possibly malicious devices and show that, compared to the most conservative model of active and collaborative corrupted devices, natural assumptions allow to significantly enhance the secret key rate or considerably reduce the necessary resources. Furthermore, we show that, for most practical situations, the resulting finite-size secret key rate is similar to that of the standard scenario assuming trusted devices.Víctor ZapateroMarcos CurtyNature PortfolioarticlePhysicsQC1-999Electronic computers. Computer scienceQA75.5-76.95ENnpj Quantum Information, Vol 7, Iss 1, Pp 1-8 (2021)
institution DOAJ
collection DOAJ
language EN
topic Physics
QC1-999
Electronic computers. Computer science
QA75.5-76.95
spellingShingle Physics
QC1-999
Electronic computers. Computer science
QA75.5-76.95
Víctor Zapatero
Marcos Curty
Secure quantum key distribution with a subset of malicious devices
description Abstract The malicious manipulation of quantum key distribution (QKD) hardware is a serious threat to its security, as, typically, neither end users nor QKD manufacturers can validate the integrity of every component of their QKD system in practice. One possible approach to re-establish the security of QKD is to use a redundant number of devices. Following this idea, we address various corruption models of the possibly malicious devices and show that, compared to the most conservative model of active and collaborative corrupted devices, natural assumptions allow to significantly enhance the secret key rate or considerably reduce the necessary resources. Furthermore, we show that, for most practical situations, the resulting finite-size secret key rate is similar to that of the standard scenario assuming trusted devices.
format article
author Víctor Zapatero
Marcos Curty
author_facet Víctor Zapatero
Marcos Curty
author_sort Víctor Zapatero
title Secure quantum key distribution with a subset of malicious devices
title_short Secure quantum key distribution with a subset of malicious devices
title_full Secure quantum key distribution with a subset of malicious devices
title_fullStr Secure quantum key distribution with a subset of malicious devices
title_full_unstemmed Secure quantum key distribution with a subset of malicious devices
title_sort secure quantum key distribution with a subset of malicious devices
publisher Nature Portfolio
publishDate 2021
url https://doaj.org/article/07174a04c1fb47cc888859497bec3adc
work_keys_str_mv AT victorzapatero securequantumkeydistributionwithasubsetofmaliciousdevices
AT marcoscurty securequantumkeydistributionwithasubsetofmaliciousdevices
_version_ 1718391944018657280