Cargando…
On the security of semi-device-independent QKD protocols
While fully device-independent security in (BB84-like) prepare-and-measure quantum key distribution (QKD) is impossible, it can be guaranteed against individual attacks in a semi-device-independent (SDI) scenario, wherein no assumptions are made on the characteristics of the hardware used except for...
Autores principales: | , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Springer US
2018
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6448325/ https://www.ncbi.nlm.nih.gov/pubmed/31007638 http://dx.doi.org/10.1007/s11128-018-1892-z |
_version_ | 1783408680072380416 |
---|---|
author | Chaturvedi, Anubhav Ray, Maharshi Veynar, Ryszard Pawłowski, Marcin |
author_facet | Chaturvedi, Anubhav Ray, Maharshi Veynar, Ryszard Pawłowski, Marcin |
author_sort | Chaturvedi, Anubhav |
collection | PubMed |
description | While fully device-independent security in (BB84-like) prepare-and-measure quantum key distribution (QKD) is impossible, it can be guaranteed against individual attacks in a semi-device-independent (SDI) scenario, wherein no assumptions are made on the characteristics of the hardware used except for an upper bound on the dimension of the communicated system. Studying security under such minimal assumptions is especially relevant in the context of the recent quantum hacking attacks wherein the eavesdroppers can not only construct the devices used by the communicating parties but are also able to remotely alter their behavior. In this work, we study the security of a SDIQKD protocol based on the prepare-and-measure quantum implementation of a well-known cryptographic primitive, the random access code (RAC). We consider imperfect detectors and establish the critical values of the security parameters (the observed success probability of the RAC and the detection efficiency) required for guaranteeing security against eavesdroppers with and without quantum memory. Furthermore, we suggest a minimal characterization of the preparation device in order to lower the requirements for establishing a secure key. |
format | Online Article Text |
id | pubmed-6448325 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2018 |
publisher | Springer US |
record_format | MEDLINE/PubMed |
spelling | pubmed-64483252019-04-17 On the security of semi-device-independent QKD protocols Chaturvedi, Anubhav Ray, Maharshi Veynar, Ryszard Pawłowski, Marcin Quantum Inf Process Article While fully device-independent security in (BB84-like) prepare-and-measure quantum key distribution (QKD) is impossible, it can be guaranteed against individual attacks in a semi-device-independent (SDI) scenario, wherein no assumptions are made on the characteristics of the hardware used except for an upper bound on the dimension of the communicated system. Studying security under such minimal assumptions is especially relevant in the context of the recent quantum hacking attacks wherein the eavesdroppers can not only construct the devices used by the communicating parties but are also able to remotely alter their behavior. In this work, we study the security of a SDIQKD protocol based on the prepare-and-measure quantum implementation of a well-known cryptographic primitive, the random access code (RAC). We consider imperfect detectors and establish the critical values of the security parameters (the observed success probability of the RAC and the detection efficiency) required for guaranteeing security against eavesdroppers with and without quantum memory. Furthermore, we suggest a minimal characterization of the preparation device in order to lower the requirements for establishing a secure key. Springer US 2018-04-21 2018 /pmc/articles/PMC6448325/ /pubmed/31007638 http://dx.doi.org/10.1007/s11128-018-1892-z Text en © The Author(s) 2018 Open AccessThis article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made. |
spellingShingle | Article Chaturvedi, Anubhav Ray, Maharshi Veynar, Ryszard Pawłowski, Marcin On the security of semi-device-independent QKD protocols |
title | On the security of semi-device-independent QKD protocols |
title_full | On the security of semi-device-independent QKD protocols |
title_fullStr | On the security of semi-device-independent QKD protocols |
title_full_unstemmed | On the security of semi-device-independent QKD protocols |
title_short | On the security of semi-device-independent QKD protocols |
title_sort | on the security of semi-device-independent qkd protocols |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6448325/ https://www.ncbi.nlm.nih.gov/pubmed/31007638 http://dx.doi.org/10.1007/s11128-018-1892-z |
work_keys_str_mv | AT chaturvedianubhav onthesecurityofsemideviceindependentqkdprotocols AT raymaharshi onthesecurityofsemideviceindependentqkdprotocols AT veynarryszard onthesecurityofsemideviceindependentqkdprotocols AT pawłowskimarcin onthesecurityofsemideviceindependentqkdprotocols |