Cargando…

Security Analysis of Continuous-Variable Measurement-Device-Independent Quantum Key Distribution Systems in Complex Communication Environments

Continuous-variable measure-device-independent quantum key distribution (CV-MDI QKD) is proposed to remove all imperfections originating from detection. However, there are still some inevitable imperfections in a practical CV-MDI QKD system. For example, there is a fluctuating channel transmittance...

Descripción completa

Detalles Bibliográficos
Autores principales: Zheng, Yi, Shi, Haobin, Pan, Wei, Wang, Quantao, Mao, Jiahui
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8774701/
https://www.ncbi.nlm.nih.gov/pubmed/35052153
http://dx.doi.org/10.3390/e24010127
_version_ 1784636412597895168
author Zheng, Yi
Shi, Haobin
Pan, Wei
Wang, Quantao
Mao, Jiahui
author_facet Zheng, Yi
Shi, Haobin
Pan, Wei
Wang, Quantao
Mao, Jiahui
author_sort Zheng, Yi
collection PubMed
description Continuous-variable measure-device-independent quantum key distribution (CV-MDI QKD) is proposed to remove all imperfections originating from detection. However, there are still some inevitable imperfections in a practical CV-MDI QKD system. For example, there is a fluctuating channel transmittance in the complex communication environments. Here we investigate the security of the system under the effects of the fluctuating channel transmittance, where the transmittance is regarded as a fixed value related to communication distance in theory. We first discuss the parameter estimation in fluctuating channel transmittance based on these establishing of channel models, which has an obvious deviation compared with the estimated parameters in the ideal case. Then, we show the evaluated results when the channel transmittance respectively obeys the two-point distribution and the uniform distribution. In particular, the two distributions can be easily realized under the manipulation of eavesdroppers. Finally, we analyze the secret key rate of the system when the channel transmittance obeys the above distributions. The simulation analysis indicates that a slight fluctuation of the channel transmittance may seriously reduce the performance of the system, especially in the extreme asymmetric case. Furthermore, the communication between Alice, Bob and Charlie may be immediately interrupted. Therefore, eavesdroppers can manipulate the channel transmittance to complete a denial-of-service attack in a practical CV-MDI QKD system. To resist this attack, the Gaussian post-selection method can be exploited to calibrate the parameter estimation to reduce the deterioration of performance of the system.
format Online
Article
Text
id pubmed-8774701
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-87747012022-01-21 Security Analysis of Continuous-Variable Measurement-Device-Independent Quantum Key Distribution Systems in Complex Communication Environments Zheng, Yi Shi, Haobin Pan, Wei Wang, Quantao Mao, Jiahui Entropy (Basel) Article Continuous-variable measure-device-independent quantum key distribution (CV-MDI QKD) is proposed to remove all imperfections originating from detection. However, there are still some inevitable imperfections in a practical CV-MDI QKD system. For example, there is a fluctuating channel transmittance in the complex communication environments. Here we investigate the security of the system under the effects of the fluctuating channel transmittance, where the transmittance is regarded as a fixed value related to communication distance in theory. We first discuss the parameter estimation in fluctuating channel transmittance based on these establishing of channel models, which has an obvious deviation compared with the estimated parameters in the ideal case. Then, we show the evaluated results when the channel transmittance respectively obeys the two-point distribution and the uniform distribution. In particular, the two distributions can be easily realized under the manipulation of eavesdroppers. Finally, we analyze the secret key rate of the system when the channel transmittance obeys the above distributions. The simulation analysis indicates that a slight fluctuation of the channel transmittance may seriously reduce the performance of the system, especially in the extreme asymmetric case. Furthermore, the communication between Alice, Bob and Charlie may be immediately interrupted. Therefore, eavesdroppers can manipulate the channel transmittance to complete a denial-of-service attack in a practical CV-MDI QKD system. To resist this attack, the Gaussian post-selection method can be exploited to calibrate the parameter estimation to reduce the deterioration of performance of the system. MDPI 2022-01-14 /pmc/articles/PMC8774701/ /pubmed/35052153 http://dx.doi.org/10.3390/e24010127 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Zheng, Yi
Shi, Haobin
Pan, Wei
Wang, Quantao
Mao, Jiahui
Security Analysis of Continuous-Variable Measurement-Device-Independent Quantum Key Distribution Systems in Complex Communication Environments
title Security Analysis of Continuous-Variable Measurement-Device-Independent Quantum Key Distribution Systems in Complex Communication Environments
title_full Security Analysis of Continuous-Variable Measurement-Device-Independent Quantum Key Distribution Systems in Complex Communication Environments
title_fullStr Security Analysis of Continuous-Variable Measurement-Device-Independent Quantum Key Distribution Systems in Complex Communication Environments
title_full_unstemmed Security Analysis of Continuous-Variable Measurement-Device-Independent Quantum Key Distribution Systems in Complex Communication Environments
title_short Security Analysis of Continuous-Variable Measurement-Device-Independent Quantum Key Distribution Systems in Complex Communication Environments
title_sort security analysis of continuous-variable measurement-device-independent quantum key distribution systems in complex communication environments
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8774701/
https://www.ncbi.nlm.nih.gov/pubmed/35052153
http://dx.doi.org/10.3390/e24010127
work_keys_str_mv AT zhengyi securityanalysisofcontinuousvariablemeasurementdeviceindependentquantumkeydistributionsystemsincomplexcommunicationenvironments
AT shihaobin securityanalysisofcontinuousvariablemeasurementdeviceindependentquantumkeydistributionsystemsincomplexcommunicationenvironments
AT panwei securityanalysisofcontinuousvariablemeasurementdeviceindependentquantumkeydistributionsystemsincomplexcommunicationenvironments
AT wangquantao securityanalysisofcontinuousvariablemeasurementdeviceindependentquantumkeydistributionsystemsincomplexcommunicationenvironments
AT maojiahui securityanalysisofcontinuousvariablemeasurementdeviceindependentquantumkeydistributionsystemsincomplexcommunicationenvironments