Security analysis and improvement of source independent quantum random number generators with imperfect devices
Abstract A quantum random number generator (QRNG) as a genuine source of randomness is essential in many applications, such as number simulation and cryptography. Recently, a source-independent quantum random number generator (SI-QRNG), which can generate secure random numbers with untrusted sources...
Guardado en:
Autores principales: | , , , , , , , , , |
---|---|
Formato: | article |
Lenguaje: | EN |
Publicado: |
Nature Portfolio
2020
|
Materias: | |
Acceso en línea: | https://doaj.org/article/6876a7be510345bc94b580163816e016 |
Etiquetas: |
Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
|
id |
oai:doaj.org-article:6876a7be510345bc94b580163816e016 |
---|---|
record_format |
dspace |
spelling |
oai:doaj.org-article:6876a7be510345bc94b580163816e0162021-12-02T16:18:10ZSecurity analysis and improvement of source independent quantum random number generators with imperfect devices10.1038/s41534-020-00331-92056-6387https://doaj.org/article/6876a7be510345bc94b580163816e0162020-12-01T00:00:00Zhttps://doi.org/10.1038/s41534-020-00331-9https://doaj.org/toc/2056-6387Abstract A quantum random number generator (QRNG) as a genuine source of randomness is essential in many applications, such as number simulation and cryptography. Recently, a source-independent quantum random number generator (SI-QRNG), which can generate secure random numbers with untrusted sources, has been realized. However, the measurement loopholes of the trusted but imperfect devices used in SI-QRNGs have not yet been fully explored, which will cause security problems, especially in high-speed systems. Here, we point out and evaluate the security loopholes of practical imperfect measurement devices in SI-QRNGs. We also provide corresponding countermeasures to prevent these information leakages by recalculating the conditional minimum entropy and adding a monitor. Furthermore, by taking into account the finite-size effect, we show that the influence of the afterpulse can exceed that of the finite-size effect with the large number of sampled rounds. Our protocol is simple and effective, and it promotes the security of SI-QRNG in practice as well as the compatibility with high-speed measurement devices, thus paving the way for constructing ultrafast and security-certified commercial SI-QRNG systems.Xing LinShuang WangZhen-Qiang YinGuan-Jie Fan-YuanRong WangWei ChenDe-Yong HeZheng ZhouGuang-Can GuoZheng-Fu HanNature PortfolioarticlePhysicsQC1-999Electronic computers. Computer scienceQA75.5-76.95ENnpj Quantum Information, Vol 6, Iss 1, Pp 1-8 (2020) |
institution |
DOAJ |
collection |
DOAJ |
language |
EN |
topic |
Physics QC1-999 Electronic computers. Computer science QA75.5-76.95 |
spellingShingle |
Physics QC1-999 Electronic computers. Computer science QA75.5-76.95 Xing Lin Shuang Wang Zhen-Qiang Yin Guan-Jie Fan-Yuan Rong Wang Wei Chen De-Yong He Zheng Zhou Guang-Can Guo Zheng-Fu Han Security analysis and improvement of source independent quantum random number generators with imperfect devices |
description |
Abstract A quantum random number generator (QRNG) as a genuine source of randomness is essential in many applications, such as number simulation and cryptography. Recently, a source-independent quantum random number generator (SI-QRNG), which can generate secure random numbers with untrusted sources, has been realized. However, the measurement loopholes of the trusted but imperfect devices used in SI-QRNGs have not yet been fully explored, which will cause security problems, especially in high-speed systems. Here, we point out and evaluate the security loopholes of practical imperfect measurement devices in SI-QRNGs. We also provide corresponding countermeasures to prevent these information leakages by recalculating the conditional minimum entropy and adding a monitor. Furthermore, by taking into account the finite-size effect, we show that the influence of the afterpulse can exceed that of the finite-size effect with the large number of sampled rounds. Our protocol is simple and effective, and it promotes the security of SI-QRNG in practice as well as the compatibility with high-speed measurement devices, thus paving the way for constructing ultrafast and security-certified commercial SI-QRNG systems. |
format |
article |
author |
Xing Lin Shuang Wang Zhen-Qiang Yin Guan-Jie Fan-Yuan Rong Wang Wei Chen De-Yong He Zheng Zhou Guang-Can Guo Zheng-Fu Han |
author_facet |
Xing Lin Shuang Wang Zhen-Qiang Yin Guan-Jie Fan-Yuan Rong Wang Wei Chen De-Yong He Zheng Zhou Guang-Can Guo Zheng-Fu Han |
author_sort |
Xing Lin |
title |
Security analysis and improvement of source independent quantum random number generators with imperfect devices |
title_short |
Security analysis and improvement of source independent quantum random number generators with imperfect devices |
title_full |
Security analysis and improvement of source independent quantum random number generators with imperfect devices |
title_fullStr |
Security analysis and improvement of source independent quantum random number generators with imperfect devices |
title_full_unstemmed |
Security analysis and improvement of source independent quantum random number generators with imperfect devices |
title_sort |
security analysis and improvement of source independent quantum random number generators with imperfect devices |
publisher |
Nature Portfolio |
publishDate |
2020 |
url |
https://doaj.org/article/6876a7be510345bc94b580163816e016 |
work_keys_str_mv |
AT xinglin securityanalysisandimprovementofsourceindependentquantumrandomnumbergeneratorswithimperfectdevices AT shuangwang securityanalysisandimprovementofsourceindependentquantumrandomnumbergeneratorswithimperfectdevices AT zhenqiangyin securityanalysisandimprovementofsourceindependentquantumrandomnumbergeneratorswithimperfectdevices AT guanjiefanyuan securityanalysisandimprovementofsourceindependentquantumrandomnumbergeneratorswithimperfectdevices AT rongwang securityanalysisandimprovementofsourceindependentquantumrandomnumbergeneratorswithimperfectdevices AT weichen securityanalysisandimprovementofsourceindependentquantumrandomnumbergeneratorswithimperfectdevices AT deyonghe securityanalysisandimprovementofsourceindependentquantumrandomnumbergeneratorswithimperfectdevices AT zhengzhou securityanalysisandimprovementofsourceindependentquantumrandomnumbergeneratorswithimperfectdevices AT guangcanguo securityanalysisandimprovementofsourceindependentquantumrandomnumbergeneratorswithimperfectdevices AT zhengfuhan securityanalysisandimprovementofsourceindependentquantumrandomnumbergeneratorswithimperfectdevices |
_version_ |
1718384172115951616 |