Secure quantum key distribution with a subset of malicious devices
Abstract The malicious manipulation of quantum key distribution (QKD) hardware is a serious threat to its security, as, typically, neither end users nor QKD manufacturers can validate the integrity of every component of their QKD system in practice. One possible approach to re-establish the security...
Guardado en:
Autores principales: | , |
---|---|
Formato: | article |
Lenguaje: | EN |
Publicado: |
Nature Portfolio
2021
|
Materias: | |
Acceso en línea: | https://doaj.org/article/07174a04c1fb47cc888859497bec3adc |
Etiquetas: |
Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
|
id |
oai:doaj.org-article:07174a04c1fb47cc888859497bec3adc |
---|---|
record_format |
dspace |
spelling |
oai:doaj.org-article:07174a04c1fb47cc888859497bec3adc2021-12-02T14:06:53ZSecure quantum key distribution with a subset of malicious devices10.1038/s41534-020-00358-y2056-6387https://doaj.org/article/07174a04c1fb47cc888859497bec3adc2021-02-01T00:00:00Zhttps://doi.org/10.1038/s41534-020-00358-yhttps://doaj.org/toc/2056-6387Abstract The malicious manipulation of quantum key distribution (QKD) hardware is a serious threat to its security, as, typically, neither end users nor QKD manufacturers can validate the integrity of every component of their QKD system in practice. One possible approach to re-establish the security of QKD is to use a redundant number of devices. Following this idea, we address various corruption models of the possibly malicious devices and show that, compared to the most conservative model of active and collaborative corrupted devices, natural assumptions allow to significantly enhance the secret key rate or considerably reduce the necessary resources. Furthermore, we show that, for most practical situations, the resulting finite-size secret key rate is similar to that of the standard scenario assuming trusted devices.Víctor ZapateroMarcos CurtyNature PortfolioarticlePhysicsQC1-999Electronic computers. Computer scienceQA75.5-76.95ENnpj Quantum Information, Vol 7, Iss 1, Pp 1-8 (2021) |
institution |
DOAJ |
collection |
DOAJ |
language |
EN |
topic |
Physics QC1-999 Electronic computers. Computer science QA75.5-76.95 |
spellingShingle |
Physics QC1-999 Electronic computers. Computer science QA75.5-76.95 Víctor Zapatero Marcos Curty Secure quantum key distribution with a subset of malicious devices |
description |
Abstract The malicious manipulation of quantum key distribution (QKD) hardware is a serious threat to its security, as, typically, neither end users nor QKD manufacturers can validate the integrity of every component of their QKD system in practice. One possible approach to re-establish the security of QKD is to use a redundant number of devices. Following this idea, we address various corruption models of the possibly malicious devices and show that, compared to the most conservative model of active and collaborative corrupted devices, natural assumptions allow to significantly enhance the secret key rate or considerably reduce the necessary resources. Furthermore, we show that, for most practical situations, the resulting finite-size secret key rate is similar to that of the standard scenario assuming trusted devices. |
format |
article |
author |
Víctor Zapatero Marcos Curty |
author_facet |
Víctor Zapatero Marcos Curty |
author_sort |
Víctor Zapatero |
title |
Secure quantum key distribution with a subset of malicious devices |
title_short |
Secure quantum key distribution with a subset of malicious devices |
title_full |
Secure quantum key distribution with a subset of malicious devices |
title_fullStr |
Secure quantum key distribution with a subset of malicious devices |
title_full_unstemmed |
Secure quantum key distribution with a subset of malicious devices |
title_sort |
secure quantum key distribution with a subset of malicious devices |
publisher |
Nature Portfolio |
publishDate |
2021 |
url |
https://doaj.org/article/07174a04c1fb47cc888859497bec3adc |
work_keys_str_mv |
AT victorzapatero securequantumkeydistributionwithasubsetofmaliciousdevices AT marcoscurty securequantumkeydistributionwithasubsetofmaliciousdevices |
_version_ |
1718391944018657280 |