Continuous-variable source-device-independent quantum key distribution against general attacks
Abstract The continuous-variable quantum key distribution with entanglement in the middle, a semi-device-independent protocol, places the source at the untrusted third party between Alice and Bob, and thus has the advantage of high levels of security with the purpose of eliminating the assumptions a...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Nature Publishing Group
2020-04-01
|
Series: | Scientific Reports |
Online Access: | https://doi.org/10.1038/s41598-020-63024-5 |
id |
doaj-7ae805bcf3a845f3a4c5b108060c5567 |
---|---|
record_format |
Article |
spelling |
doaj-7ae805bcf3a845f3a4c5b108060c55672021-04-25T11:40:20ZengNature Publishing GroupScientific Reports2045-23222020-04-0110111010.1038/s41598-020-63024-5Continuous-variable source-device-independent quantum key distribution against general attacksYichen Zhang0Ziyang Chen1Christian Weedbrook2Song Yu3Hong Guo4State Key Laboratory of Information Photonics and Optical Communications, Beijing University of Posts and TelecommunicationsState Key Laboratory of Advanced Optical Communication Systems and Networks, Department of Electronics, and Center for Quantum Information Technology, Peking UniversityXanadu, 372 Richmond St WState Key Laboratory of Information Photonics and Optical Communications, Beijing University of Posts and TelecommunicationsState Key Laboratory of Advanced Optical Communication Systems and Networks, Department of Electronics, and Center for Quantum Information Technology, Peking UniversityAbstract The continuous-variable quantum key distribution with entanglement in the middle, a semi-device-independent protocol, places the source at the untrusted third party between Alice and Bob, and thus has the advantage of high levels of security with the purpose of eliminating the assumptions about the source device. However, previous works considered the collective-attack analysis, which inevitably assumes that the states of the source has an identical and independently distributed (i.i.d) structure, and limits the application of the protocol. To solve this problem, we modify the original protocol by exploiting an energy test to monitor the potential high energy attacks an adversary may use. Our analysis removes the assumptions of the light source and the modified protocol can therefore be called source-device-independent protocol. Moreover, we analyze the security of the continuous-variable source-device-independent quantum key distribution protocol with a homodyne-homodyne structure against general coherent attacks by adapting a state-independent entropic uncertainty relation. The simulation results indicate that, in the universal composable security framework, the protocol can still achieve high key rates against coherent attacks under the condition of achievable block lengths.https://doi.org/10.1038/s41598-020-63024-5 |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Yichen Zhang Ziyang Chen Christian Weedbrook Song Yu Hong Guo |
spellingShingle |
Yichen Zhang Ziyang Chen Christian Weedbrook Song Yu Hong Guo Continuous-variable source-device-independent quantum key distribution against general attacks Scientific Reports |
author_facet |
Yichen Zhang Ziyang Chen Christian Weedbrook Song Yu Hong Guo |
author_sort |
Yichen Zhang |
title |
Continuous-variable source-device-independent quantum key distribution against general attacks |
title_short |
Continuous-variable source-device-independent quantum key distribution against general attacks |
title_full |
Continuous-variable source-device-independent quantum key distribution against general attacks |
title_fullStr |
Continuous-variable source-device-independent quantum key distribution against general attacks |
title_full_unstemmed |
Continuous-variable source-device-independent quantum key distribution against general attacks |
title_sort |
continuous-variable source-device-independent quantum key distribution against general attacks |
publisher |
Nature Publishing Group |
series |
Scientific Reports |
issn |
2045-2322 |
publishDate |
2020-04-01 |
description |
Abstract The continuous-variable quantum key distribution with entanglement in the middle, a semi-device-independent protocol, places the source at the untrusted third party between Alice and Bob, and thus has the advantage of high levels of security with the purpose of eliminating the assumptions about the source device. However, previous works considered the collective-attack analysis, which inevitably assumes that the states of the source has an identical and independently distributed (i.i.d) structure, and limits the application of the protocol. To solve this problem, we modify the original protocol by exploiting an energy test to monitor the potential high energy attacks an adversary may use. Our analysis removes the assumptions of the light source and the modified protocol can therefore be called source-device-independent protocol. Moreover, we analyze the security of the continuous-variable source-device-independent quantum key distribution protocol with a homodyne-homodyne structure against general coherent attacks by adapting a state-independent entropic uncertainty relation. The simulation results indicate that, in the universal composable security framework, the protocol can still achieve high key rates against coherent attacks under the condition of achievable block lengths. |
url |
https://doi.org/10.1038/s41598-020-63024-5 |
work_keys_str_mv |
AT yichenzhang continuousvariablesourcedeviceindependentquantumkeydistributionagainstgeneralattacks AT ziyangchen continuousvariablesourcedeviceindependentquantumkeydistributionagainstgeneralattacks AT christianweedbrook continuousvariablesourcedeviceindependentquantumkeydistributionagainstgeneralattacks AT songyu continuousvariablesourcedeviceindependentquantumkeydistributionagainstgeneralattacks AT hongguo continuousvariablesourcedeviceindependentquantumkeydistributionagainstgeneralattacks |
_version_ |
1721509471791874048 |