Continuous-variable source-device-independent quantum key distribution against general attacks

Abstract The continuous-variable quantum key distribution with entanglement in the middle, a semi-device-independent protocol, places the source at the untrusted third party between Alice and Bob, and thus has the advantage of high levels of security with the purpose of eliminating the assumptions a...

Descripción completa

Guardado en:
Detalles Bibliográficos
Autores principales: Yichen Zhang, Ziyang Chen, Christian Weedbrook, Song Yu, Hong Guo
Formato: article
Lenguaje:EN
Publicado: Nature Portfolio 2020
Materias:
R
Q
Acceso en línea:https://doaj.org/article/7ae805bcf3a845f3a4c5b108060c5567
Etiquetas: Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
id oai:doaj.org-article:7ae805bcf3a845f3a4c5b108060c5567
record_format dspace
spelling oai:doaj.org-article:7ae805bcf3a845f3a4c5b108060c55672021-12-02T18:27:50ZContinuous-variable source-device-independent quantum key distribution against general attacks10.1038/s41598-020-63024-52045-2322https://doaj.org/article/7ae805bcf3a845f3a4c5b108060c55672020-04-01T00:00:00Zhttps://doi.org/10.1038/s41598-020-63024-5https://doaj.org/toc/2045-2322Abstract The continuous-variable quantum key distribution with entanglement in the middle, a semi-device-independent protocol, places the source at the untrusted third party between Alice and Bob, and thus has the advantage of high levels of security with the purpose of eliminating the assumptions about the source device. However, previous works considered the collective-attack analysis, which inevitably assumes that the states of the source has an identical and independently distributed (i.i.d) structure, and limits the application of the protocol. To solve this problem, we modify the original protocol by exploiting an energy test to monitor the potential high energy attacks an adversary may use. Our analysis removes the assumptions of the light source and the modified protocol can therefore be called source-device-independent protocol. Moreover, we analyze the security of the continuous-variable source-device-independent quantum key distribution protocol with a homodyne-homodyne structure against general coherent attacks by adapting a state-independent entropic uncertainty relation. The simulation results indicate that, in the universal composable security framework, the protocol can still achieve high key rates against coherent attacks under the condition of achievable block lengths.Yichen ZhangZiyang ChenChristian WeedbrookSong YuHong GuoNature PortfolioarticleMedicineRScienceQENScientific Reports, Vol 10, Iss 1, Pp 1-10 (2020)
institution DOAJ
collection DOAJ
language EN
topic Medicine
R
Science
Q
spellingShingle Medicine
R
Science
Q
Yichen Zhang
Ziyang Chen
Christian Weedbrook
Song Yu
Hong Guo
Continuous-variable source-device-independent quantum key distribution against general attacks
description Abstract The continuous-variable quantum key distribution with entanglement in the middle, a semi-device-independent protocol, places the source at the untrusted third party between Alice and Bob, and thus has the advantage of high levels of security with the purpose of eliminating the assumptions about the source device. However, previous works considered the collective-attack analysis, which inevitably assumes that the states of the source has an identical and independently distributed (i.i.d) structure, and limits the application of the protocol. To solve this problem, we modify the original protocol by exploiting an energy test to monitor the potential high energy attacks an adversary may use. Our analysis removes the assumptions of the light source and the modified protocol can therefore be called source-device-independent protocol. Moreover, we analyze the security of the continuous-variable source-device-independent quantum key distribution protocol with a homodyne-homodyne structure against general coherent attacks by adapting a state-independent entropic uncertainty relation. The simulation results indicate that, in the universal composable security framework, the protocol can still achieve high key rates against coherent attacks under the condition of achievable block lengths.
format article
author Yichen Zhang
Ziyang Chen
Christian Weedbrook
Song Yu
Hong Guo
author_facet Yichen Zhang
Ziyang Chen
Christian Weedbrook
Song Yu
Hong Guo
author_sort Yichen Zhang
title Continuous-variable source-device-independent quantum key distribution against general attacks
title_short Continuous-variable source-device-independent quantum key distribution against general attacks
title_full Continuous-variable source-device-independent quantum key distribution against general attacks
title_fullStr Continuous-variable source-device-independent quantum key distribution against general attacks
title_full_unstemmed Continuous-variable source-device-independent quantum key distribution against general attacks
title_sort continuous-variable source-device-independent quantum key distribution against general attacks
publisher Nature Portfolio
publishDate 2020
url https://doaj.org/article/7ae805bcf3a845f3a4c5b108060c5567
work_keys_str_mv AT yichenzhang continuousvariablesourcedeviceindependentquantumkeydistributionagainstgeneralattacks
AT ziyangchen continuousvariablesourcedeviceindependentquantumkeydistributionagainstgeneralattacks
AT christianweedbrook continuousvariablesourcedeviceindependentquantumkeydistributionagainstgeneralattacks
AT songyu continuousvariablesourcedeviceindependentquantumkeydistributionagainstgeneralattacks
AT hongguo continuousvariablesourcedeviceindependentquantumkeydistributionagainstgeneralattacks
_version_ 1718377987333685248