Cargando…
Security Analysis of Continuous-Variable Measurement-Device-Independent Quantum Key Distribution Systems in Complex Communication Environments
Continuous-variable measure-device-independent quantum key distribution (CV-MDI QKD) is proposed to remove all imperfections originating from detection. However, there are still some inevitable imperfections in a practical CV-MDI QKD system. For example, there is a fluctuating channel transmittance...
Autores principales: | , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2022
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8774701/ https://www.ncbi.nlm.nih.gov/pubmed/35052153 http://dx.doi.org/10.3390/e24010127 |
_version_ | 1784636412597895168 |
---|---|
author | Zheng, Yi Shi, Haobin Pan, Wei Wang, Quantao Mao, Jiahui |
author_facet | Zheng, Yi Shi, Haobin Pan, Wei Wang, Quantao Mao, Jiahui |
author_sort | Zheng, Yi |
collection | PubMed |
description | Continuous-variable measure-device-independent quantum key distribution (CV-MDI QKD) is proposed to remove all imperfections originating from detection. However, there are still some inevitable imperfections in a practical CV-MDI QKD system. For example, there is a fluctuating channel transmittance in the complex communication environments. Here we investigate the security of the system under the effects of the fluctuating channel transmittance, where the transmittance is regarded as a fixed value related to communication distance in theory. We first discuss the parameter estimation in fluctuating channel transmittance based on these establishing of channel models, which has an obvious deviation compared with the estimated parameters in the ideal case. Then, we show the evaluated results when the channel transmittance respectively obeys the two-point distribution and the uniform distribution. In particular, the two distributions can be easily realized under the manipulation of eavesdroppers. Finally, we analyze the secret key rate of the system when the channel transmittance obeys the above distributions. The simulation analysis indicates that a slight fluctuation of the channel transmittance may seriously reduce the performance of the system, especially in the extreme asymmetric case. Furthermore, the communication between Alice, Bob and Charlie may be immediately interrupted. Therefore, eavesdroppers can manipulate the channel transmittance to complete a denial-of-service attack in a practical CV-MDI QKD system. To resist this attack, the Gaussian post-selection method can be exploited to calibrate the parameter estimation to reduce the deterioration of performance of the system. |
format | Online Article Text |
id | pubmed-8774701 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2022 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-87747012022-01-21 Security Analysis of Continuous-Variable Measurement-Device-Independent Quantum Key Distribution Systems in Complex Communication Environments Zheng, Yi Shi, Haobin Pan, Wei Wang, Quantao Mao, Jiahui Entropy (Basel) Article Continuous-variable measure-device-independent quantum key distribution (CV-MDI QKD) is proposed to remove all imperfections originating from detection. However, there are still some inevitable imperfections in a practical CV-MDI QKD system. For example, there is a fluctuating channel transmittance in the complex communication environments. Here we investigate the security of the system under the effects of the fluctuating channel transmittance, where the transmittance is regarded as a fixed value related to communication distance in theory. We first discuss the parameter estimation in fluctuating channel transmittance based on these establishing of channel models, which has an obvious deviation compared with the estimated parameters in the ideal case. Then, we show the evaluated results when the channel transmittance respectively obeys the two-point distribution and the uniform distribution. In particular, the two distributions can be easily realized under the manipulation of eavesdroppers. Finally, we analyze the secret key rate of the system when the channel transmittance obeys the above distributions. The simulation analysis indicates that a slight fluctuation of the channel transmittance may seriously reduce the performance of the system, especially in the extreme asymmetric case. Furthermore, the communication between Alice, Bob and Charlie may be immediately interrupted. Therefore, eavesdroppers can manipulate the channel transmittance to complete a denial-of-service attack in a practical CV-MDI QKD system. To resist this attack, the Gaussian post-selection method can be exploited to calibrate the parameter estimation to reduce the deterioration of performance of the system. MDPI 2022-01-14 /pmc/articles/PMC8774701/ /pubmed/35052153 http://dx.doi.org/10.3390/e24010127 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Zheng, Yi Shi, Haobin Pan, Wei Wang, Quantao Mao, Jiahui Security Analysis of Continuous-Variable Measurement-Device-Independent Quantum Key Distribution Systems in Complex Communication Environments |
title | Security Analysis of Continuous-Variable Measurement-Device-Independent Quantum Key Distribution Systems in Complex Communication Environments |
title_full | Security Analysis of Continuous-Variable Measurement-Device-Independent Quantum Key Distribution Systems in Complex Communication Environments |
title_fullStr | Security Analysis of Continuous-Variable Measurement-Device-Independent Quantum Key Distribution Systems in Complex Communication Environments |
title_full_unstemmed | Security Analysis of Continuous-Variable Measurement-Device-Independent Quantum Key Distribution Systems in Complex Communication Environments |
title_short | Security Analysis of Continuous-Variable Measurement-Device-Independent Quantum Key Distribution Systems in Complex Communication Environments |
title_sort | security analysis of continuous-variable measurement-device-independent quantum key distribution systems in complex communication environments |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8774701/ https://www.ncbi.nlm.nih.gov/pubmed/35052153 http://dx.doi.org/10.3390/e24010127 |
work_keys_str_mv | AT zhengyi securityanalysisofcontinuousvariablemeasurementdeviceindependentquantumkeydistributionsystemsincomplexcommunicationenvironments AT shihaobin securityanalysisofcontinuousvariablemeasurementdeviceindependentquantumkeydistributionsystemsincomplexcommunicationenvironments AT panwei securityanalysisofcontinuousvariablemeasurementdeviceindependentquantumkeydistributionsystemsincomplexcommunicationenvironments AT wangquantao securityanalysisofcontinuousvariablemeasurementdeviceindependentquantumkeydistributionsystemsincomplexcommunicationenvironments AT maojiahui securityanalysisofcontinuousvariablemeasurementdeviceindependentquantumkeydistributionsystemsincomplexcommunicationenvironments |