Cargando…

On the security of semi-device-independent QKD protocols

While fully device-independent security in (BB84-like) prepare-and-measure quantum key distribution (QKD) is impossible, it can be guaranteed against individual attacks in a semi-device-independent (SDI) scenario, wherein no assumptions are made on the characteristics of the hardware used except for...

Descripción completa

Detalles Bibliográficos
Autores principales: Chaturvedi, Anubhav, Ray, Maharshi, Veynar, Ryszard, Pawłowski, Marcin
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Springer US 2018
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6448325/
https://www.ncbi.nlm.nih.gov/pubmed/31007638
http://dx.doi.org/10.1007/s11128-018-1892-z
_version_ 1783408680072380416
author Chaturvedi, Anubhav
Ray, Maharshi
Veynar, Ryszard
Pawłowski, Marcin
author_facet Chaturvedi, Anubhav
Ray, Maharshi
Veynar, Ryszard
Pawłowski, Marcin
author_sort Chaturvedi, Anubhav
collection PubMed
description While fully device-independent security in (BB84-like) prepare-and-measure quantum key distribution (QKD) is impossible, it can be guaranteed against individual attacks in a semi-device-independent (SDI) scenario, wherein no assumptions are made on the characteristics of the hardware used except for an upper bound on the dimension of the communicated system. Studying security under such minimal assumptions is especially relevant in the context of the recent quantum hacking attacks wherein the eavesdroppers can not only construct the devices used by the communicating parties but are also able to remotely alter their behavior. In this work, we study the security of a SDIQKD protocol based on the prepare-and-measure quantum implementation of a well-known cryptographic primitive, the random access code (RAC). We consider imperfect detectors and establish the critical values of the security parameters (the observed success probability of the RAC and the detection efficiency) required for guaranteeing security against eavesdroppers with and without quantum memory. Furthermore, we suggest a minimal characterization of the preparation device in order to lower the requirements for establishing a secure key.
format Online
Article
Text
id pubmed-6448325
institution National Center for Biotechnology Information
language English
publishDate 2018
publisher Springer US
record_format MEDLINE/PubMed
spelling pubmed-64483252019-04-17 On the security of semi-device-independent QKD protocols Chaturvedi, Anubhav Ray, Maharshi Veynar, Ryszard Pawłowski, Marcin Quantum Inf Process Article While fully device-independent security in (BB84-like) prepare-and-measure quantum key distribution (QKD) is impossible, it can be guaranteed against individual attacks in a semi-device-independent (SDI) scenario, wherein no assumptions are made on the characteristics of the hardware used except for an upper bound on the dimension of the communicated system. Studying security under such minimal assumptions is especially relevant in the context of the recent quantum hacking attacks wherein the eavesdroppers can not only construct the devices used by the communicating parties but are also able to remotely alter their behavior. In this work, we study the security of a SDIQKD protocol based on the prepare-and-measure quantum implementation of a well-known cryptographic primitive, the random access code (RAC). We consider imperfect detectors and establish the critical values of the security parameters (the observed success probability of the RAC and the detection efficiency) required for guaranteeing security against eavesdroppers with and without quantum memory. Furthermore, we suggest a minimal characterization of the preparation device in order to lower the requirements for establishing a secure key. Springer US 2018-04-21 2018 /pmc/articles/PMC6448325/ /pubmed/31007638 http://dx.doi.org/10.1007/s11128-018-1892-z Text en © The Author(s) 2018 Open AccessThis article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.
spellingShingle Article
Chaturvedi, Anubhav
Ray, Maharshi
Veynar, Ryszard
Pawłowski, Marcin
On the security of semi-device-independent QKD protocols
title On the security of semi-device-independent QKD protocols
title_full On the security of semi-device-independent QKD protocols
title_fullStr On the security of semi-device-independent QKD protocols
title_full_unstemmed On the security of semi-device-independent QKD protocols
title_short On the security of semi-device-independent QKD protocols
title_sort on the security of semi-device-independent qkd protocols
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6448325/
https://www.ncbi.nlm.nih.gov/pubmed/31007638
http://dx.doi.org/10.1007/s11128-018-1892-z
work_keys_str_mv AT chaturvedianubhav onthesecurityofsemideviceindependentqkdprotocols
AT raymaharshi onthesecurityofsemideviceindependentqkdprotocols
AT veynarryszard onthesecurityofsemideviceindependentqkdprotocols
AT pawłowskimarcin onthesecurityofsemideviceindependentqkdprotocols