Cargando…
Continuous-variable source-device-independent quantum key distribution against general attacks
The continuous-variable quantum key distribution with entanglement in the middle, a semi-device-independent protocol, places the source at the untrusted third party between Alice and Bob, and thus has the advantage of high levels of security with the purpose of eliminating the assumptions about the...
Autores principales: | , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Nature Publishing Group UK
2020
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7174339/ https://www.ncbi.nlm.nih.gov/pubmed/32317691 http://dx.doi.org/10.1038/s41598-020-63024-5 |
_version_ | 1783524617511501824 |
---|---|
author | Zhang, Yichen Chen, Ziyang Weedbrook, Christian Yu, Song Guo, Hong |
author_facet | Zhang, Yichen Chen, Ziyang Weedbrook, Christian Yu, Song Guo, Hong |
author_sort | Zhang, Yichen |
collection | PubMed |
description | The continuous-variable quantum key distribution with entanglement in the middle, a semi-device-independent protocol, places the source at the untrusted third party between Alice and Bob, and thus has the advantage of high levels of security with the purpose of eliminating the assumptions about the source device. However, previous works considered the collective-attack analysis, which inevitably assumes that the states of the source has an identical and independently distributed (i.i.d) structure, and limits the application of the protocol. To solve this problem, we modify the original protocol by exploiting an energy test to monitor the potential high energy attacks an adversary may use. Our analysis removes the assumptions of the light source and the modified protocol can therefore be called source-device-independent protocol. Moreover, we analyze the security of the continuous-variable source-device-independent quantum key distribution protocol with a homodyne-homodyne structure against general coherent attacks by adapting a state-independent entropic uncertainty relation. The simulation results indicate that, in the universal composable security framework, the protocol can still achieve high key rates against coherent attacks under the condition of achievable block lengths. |
format | Online Article Text |
id | pubmed-7174339 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2020 |
publisher | Nature Publishing Group UK |
record_format | MEDLINE/PubMed |
spelling | pubmed-71743392020-04-24 Continuous-variable source-device-independent quantum key distribution against general attacks Zhang, Yichen Chen, Ziyang Weedbrook, Christian Yu, Song Guo, Hong Sci Rep Article The continuous-variable quantum key distribution with entanglement in the middle, a semi-device-independent protocol, places the source at the untrusted third party between Alice and Bob, and thus has the advantage of high levels of security with the purpose of eliminating the assumptions about the source device. However, previous works considered the collective-attack analysis, which inevitably assumes that the states of the source has an identical and independently distributed (i.i.d) structure, and limits the application of the protocol. To solve this problem, we modify the original protocol by exploiting an energy test to monitor the potential high energy attacks an adversary may use. Our analysis removes the assumptions of the light source and the modified protocol can therefore be called source-device-independent protocol. Moreover, we analyze the security of the continuous-variable source-device-independent quantum key distribution protocol with a homodyne-homodyne structure against general coherent attacks by adapting a state-independent entropic uncertainty relation. The simulation results indicate that, in the universal composable security framework, the protocol can still achieve high key rates against coherent attacks under the condition of achievable block lengths. Nature Publishing Group UK 2020-04-21 /pmc/articles/PMC7174339/ /pubmed/32317691 http://dx.doi.org/10.1038/s41598-020-63024-5 Text en © The Author(s) 2020 Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/. |
spellingShingle | Article Zhang, Yichen Chen, Ziyang Weedbrook, Christian Yu, Song Guo, Hong Continuous-variable source-device-independent quantum key distribution against general attacks |
title | Continuous-variable source-device-independent quantum key distribution against general attacks |
title_full | Continuous-variable source-device-independent quantum key distribution against general attacks |
title_fullStr | Continuous-variable source-device-independent quantum key distribution against general attacks |
title_full_unstemmed | Continuous-variable source-device-independent quantum key distribution against general attacks |
title_short | Continuous-variable source-device-independent quantum key distribution against general attacks |
title_sort | continuous-variable source-device-independent quantum key distribution against general attacks |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7174339/ https://www.ncbi.nlm.nih.gov/pubmed/32317691 http://dx.doi.org/10.1038/s41598-020-63024-5 |
work_keys_str_mv | AT zhangyichen continuousvariablesourcedeviceindependentquantumkeydistributionagainstgeneralattacks AT chenziyang continuousvariablesourcedeviceindependentquantumkeydistributionagainstgeneralattacks AT weedbrookchristian continuousvariablesourcedeviceindependentquantumkeydistributionagainstgeneralattacks AT yusong continuousvariablesourcedeviceindependentquantumkeydistributionagainstgeneralattacks AT guohong continuousvariablesourcedeviceindependentquantumkeydistributionagainstgeneralattacks |