scholarly journals Open-Destination Measurement-Device-Independent Quantum Key Distribution Network

Entropy ◽  
2020 ◽  
Vol 22 (10) ◽  
pp. 1083
Author(s):  
Wen-Fei Cao ◽  
Yi-Zheng Zhen ◽  
Yu-Lin Zheng ◽  
Shuai Zhao ◽  
Feihu Xu ◽  
...  

Quantum key distribution (QKD) networks hold promise for sharing secure randomness over multi-partities. Most existing QKD network schemes and demonstrations are based on trusted relays or limited to point-to-point scenario. Here, we propose a flexible and extensible scheme named as open-destination measurement-device-independent QKD network. The scheme enjoys security against untrusted relays and all detector side-channel attacks. Particularly, any users can accomplish key distribution under assistance of others in the network. As an illustration, we show in detail a four-user network where two users establish secure communication and present realistic simulations by taking into account imperfections of both sources and detectors.

2019 ◽  
Vol 27 (5) ◽  
pp. 5982 ◽  
Author(s):  
Ci-Yu Wang ◽  
Jun Gao ◽  
Zhi-Qiang Jiao ◽  
Lu-Feng Qiao ◽  
Ruo-Jing Ren ◽  
...  

2018 ◽  
Vol 16 (02) ◽  
pp. 1850012 ◽  
Author(s):  
Jinjun He ◽  
Qin Li ◽  
Chunhui Wu ◽  
Wai Hong Chan ◽  
Shengyu Zhang

Semiquantum key distribution (SQKD) allows two parties to share a common string when one of them is quantum and the other has rather limited quantum capability. Almost all existing SQKD protocols have been proved to be robust in theory, namely that if an eavesdropper tries to gain information, he will inevitably induce some detectable errors. However, ideal devices do not exist in reality and their imperfection may result in side-channel attacks, which can be used by an adversary to get some information on the secret key string. In this paper, we design a measurement-device-independent SQKD protocol for the first time, which can remove the threat of all detector side-channel attacks and show that it is also robust. In addition, we discuss the possible use of the proposed protocol in real-world applications and in QKD networks.


2021 ◽  
Vol 11 (1) ◽  
Author(s):  
Weilong Wang ◽  
Kiyoshi Tamaki ◽  
Marcos Curty

AbstractMeasurement-device-independent quantum key distribution (MDI-QKD) can remove all detection side-channels from quantum communication systems. The security proofs require, however, that certain assumptions on the sources are satisfied. This includes, for instance, the requirement that there is no information leakage from the transmitters of the senders, which unfortunately is very difficult to guarantee in practice. In this paper we relax this unrealistic assumption by presenting a general formalism to prove the security of MDI-QKD with leaky sources. With this formalism, we analyze the finite-key security of two prominent MDI-QKD schemes—a symmetric three-intensity decoy-state MDI-QKD protocol and a four-intensity decoy-state MDI-QKD protocol—and determine their robustness against information leakage from both the intensity modulator and the phase modulator of the transmitters. Our work shows that MDI-QKD is feasible within a reasonable time frame of signal transmission given that the sources are sufficiently isolated. Thus, it provides an essential reference for experimentalists to ensure the security of implementations of MDI-QKD in the presence of information leakage.


2020 ◽  
Vol 125 (26) ◽  
Author(s):  
Yuan Cao ◽  
Yu-Huai Li ◽  
Kui-Xing Yang ◽  
Yang-Fan Jiang ◽  
Shuang-Lin Li ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document