Security analysis and improvement of source independent quantum random number generators with imperfect devices

Abstract A quantum random number generator (QRNG) as a genuine source of randomness is essential in many applications, such as number simulation and cryptography. Recently, a source-independent quantum random number generator (SI-QRNG), which can generate secure random numbers with untrusted sources...

Descripción completa

Guardado en:
Detalles Bibliográficos
Autores principales: Xing Lin, Shuang Wang, Zhen-Qiang Yin, Guan-Jie Fan-Yuan, Rong Wang, Wei Chen, De-Yong He, Zheng Zhou, Guang-Can Guo, Zheng-Fu Han
Formato: article
Lenguaje:EN
Publicado: Nature Portfolio 2020
Materias:
Acceso en línea:https://doaj.org/article/6876a7be510345bc94b580163816e016
Etiquetas: Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
id oai:doaj.org-article:6876a7be510345bc94b580163816e016
record_format dspace
spelling oai:doaj.org-article:6876a7be510345bc94b580163816e0162021-12-02T16:18:10ZSecurity analysis and improvement of source independent quantum random number generators with imperfect devices10.1038/s41534-020-00331-92056-6387https://doaj.org/article/6876a7be510345bc94b580163816e0162020-12-01T00:00:00Zhttps://doi.org/10.1038/s41534-020-00331-9https://doaj.org/toc/2056-6387Abstract A quantum random number generator (QRNG) as a genuine source of randomness is essential in many applications, such as number simulation and cryptography. Recently, a source-independent quantum random number generator (SI-QRNG), which can generate secure random numbers with untrusted sources, has been realized. However, the measurement loopholes of the trusted but imperfect devices used in SI-QRNGs have not yet been fully explored, which will cause security problems, especially in high-speed systems. Here, we point out and evaluate the security loopholes of practical imperfect measurement devices in SI-QRNGs. We also provide corresponding countermeasures to prevent these information leakages by recalculating the conditional minimum entropy and adding a monitor. Furthermore, by taking into account the finite-size effect, we show that the influence of the afterpulse can exceed that of the finite-size effect with the large number of sampled rounds. Our protocol is simple and effective, and it promotes the security of SI-QRNG in practice as well as the compatibility with high-speed measurement devices, thus paving the way for constructing ultrafast and security-certified commercial SI-QRNG systems.Xing LinShuang WangZhen-Qiang YinGuan-Jie Fan-YuanRong WangWei ChenDe-Yong HeZheng ZhouGuang-Can GuoZheng-Fu HanNature PortfolioarticlePhysicsQC1-999Electronic computers. Computer scienceQA75.5-76.95ENnpj Quantum Information, Vol 6, Iss 1, Pp 1-8 (2020)
institution DOAJ
collection DOAJ
language EN
topic Physics
QC1-999
Electronic computers. Computer science
QA75.5-76.95
spellingShingle Physics
QC1-999
Electronic computers. Computer science
QA75.5-76.95
Xing Lin
Shuang Wang
Zhen-Qiang Yin
Guan-Jie Fan-Yuan
Rong Wang
Wei Chen
De-Yong He
Zheng Zhou
Guang-Can Guo
Zheng-Fu Han
Security analysis and improvement of source independent quantum random number generators with imperfect devices
description Abstract A quantum random number generator (QRNG) as a genuine source of randomness is essential in many applications, such as number simulation and cryptography. Recently, a source-independent quantum random number generator (SI-QRNG), which can generate secure random numbers with untrusted sources, has been realized. However, the measurement loopholes of the trusted but imperfect devices used in SI-QRNGs have not yet been fully explored, which will cause security problems, especially in high-speed systems. Here, we point out and evaluate the security loopholes of practical imperfect measurement devices in SI-QRNGs. We also provide corresponding countermeasures to prevent these information leakages by recalculating the conditional minimum entropy and adding a monitor. Furthermore, by taking into account the finite-size effect, we show that the influence of the afterpulse can exceed that of the finite-size effect with the large number of sampled rounds. Our protocol is simple and effective, and it promotes the security of SI-QRNG in practice as well as the compatibility with high-speed measurement devices, thus paving the way for constructing ultrafast and security-certified commercial SI-QRNG systems.
format article
author Xing Lin
Shuang Wang
Zhen-Qiang Yin
Guan-Jie Fan-Yuan
Rong Wang
Wei Chen
De-Yong He
Zheng Zhou
Guang-Can Guo
Zheng-Fu Han
author_facet Xing Lin
Shuang Wang
Zhen-Qiang Yin
Guan-Jie Fan-Yuan
Rong Wang
Wei Chen
De-Yong He
Zheng Zhou
Guang-Can Guo
Zheng-Fu Han
author_sort Xing Lin
title Security analysis and improvement of source independent quantum random number generators with imperfect devices
title_short Security analysis and improvement of source independent quantum random number generators with imperfect devices
title_full Security analysis and improvement of source independent quantum random number generators with imperfect devices
title_fullStr Security analysis and improvement of source independent quantum random number generators with imperfect devices
title_full_unstemmed Security analysis and improvement of source independent quantum random number generators with imperfect devices
title_sort security analysis and improvement of source independent quantum random number generators with imperfect devices
publisher Nature Portfolio
publishDate 2020
url https://doaj.org/article/6876a7be510345bc94b580163816e016
work_keys_str_mv AT xinglin securityanalysisandimprovementofsourceindependentquantumrandomnumbergeneratorswithimperfectdevices
AT shuangwang securityanalysisandimprovementofsourceindependentquantumrandomnumbergeneratorswithimperfectdevices
AT zhenqiangyin securityanalysisandimprovementofsourceindependentquantumrandomnumbergeneratorswithimperfectdevices
AT guanjiefanyuan securityanalysisandimprovementofsourceindependentquantumrandomnumbergeneratorswithimperfectdevices
AT rongwang securityanalysisandimprovementofsourceindependentquantumrandomnumbergeneratorswithimperfectdevices
AT weichen securityanalysisandimprovementofsourceindependentquantumrandomnumbergeneratorswithimperfectdevices
AT deyonghe securityanalysisandimprovementofsourceindependentquantumrandomnumbergeneratorswithimperfectdevices
AT zhengzhou securityanalysisandimprovementofsourceindependentquantumrandomnumbergeneratorswithimperfectdevices
AT guangcanguo securityanalysisandimprovementofsourceindependentquantumrandomnumbergeneratorswithimperfectdevices
AT zhengfuhan securityanalysisandimprovementofsourceindependentquantumrandomnumbergeneratorswithimperfectdevices
_version_ 1718384172115951616