Preview

Nanosystems: Physics, Chemistry, Mathematics

Advanced search

Overview of device-independent continuous-variable quantum key distribution

https://doi.org/10.17586/2220-8054-2022-13-3-290-298

Abstract

The objects of study of this paper are quantum key distribution (QKD) protocols and systems, in particular, continuous variable (CV) ones with untrusted devices (measurement devices or light sources). The present work is devoted to the consideration of such systems, namely, device-indepentent CV-QKD, and to the discussion of their performance.

About the Authors

R. Goncharov
ITMO University
Russian Federation


E. Bolychev
ITMO University
Russian Federation


I. Vorontsova
ITMO University
Russian Federation


E. Samsonov
ITMO University
Russian Federation


V. Egorov
ITMO University
Russian Federation


References

1. Pirandola S., Andersen U.L., Banchi L., Berta M., Bunandar D., Colbeck R., Englund D., Gehring T., Lupo C., Ottaviani C., Pereira J.L., Razavi M., Shamsul Shaari J., Tomamichel M., Usenko V.C., Vallone G., Villoresi P., and Wallden P. Advances in quantum cryptography, Advances in Optics and Photonics, 2020, 12, P. 1012.

2. Shor P.W. and Preskill J. Simple Proof of Security of the BB84 Quantum Key Distribution Protocol, Physical Review Letters, 2000, 85, P. 441-444.

3. Laudenbach F., Pacher C., Fung C.-H. F., Poppe A., Peev M., Schrenk B., Hentschel M., Walther P., and Hu¨bel H., Continuous-Variable Quantum Key Distribution with Gaussian Modulation-The Theory of Practical Implementations. Advanced Quantum Technologies, 2018 1(8), P. 1800011.

4. Li Z., Zhang Y.-C., Xu F., Peng X., and Guo H. Continuous-variable measurement-device-independent quantum key distribution. Physical Review A, 2014, 89(5), P. 052301.

5. Xu F., Ma X., Zhang Q., Lo H.-K., and Pan J.-W. Secure quantum key distribution with realistic devices. Reviews of Modern Physics, 2020, 92(5), P. 025002.

6. Lo H.-K., Curty M., and Qi B. Measurement-Device-Independent Quantum Key Distribution. Physical Review Letters, 2012, 108(3), P. 130503.

7. Lucamarini M., Yuan Z.L., Dynes J.F., and Shields A.J. Overcoming the rate-distance limit of quantum key distribution without quantum repeaters. Nature, 2018, 557(5), P. 400-403.

8. Bennett C.H. and Brassard G. Quantum cryptography: Public key distribution and coin tossing. Theoretical Computer Science, 2014, 560(12), P. 7-11.

9. Hillery M. Quantum cryptography with squeezed states. Physical Review A, 2000, 61(1), P. 22309.

10. Cerf N.J., Le´vy M., and Assche G.V. Quantum distribution of Gaussian keys using squeezed states. Physical Review A, 2001, 63(4), P. 052311.

11. Grosshans F., Van Assche G., Wenger J., Brouri R., Cerf N.J., and Grangier P. Quantum key distribution using gaussian-modulated coherent states. Nature, 2003, 421(1), P. 238-241.

12. Weedbrook C., Lance A.M., Bowen W.P., Symul T., Ralph T.C., and Lam P.K. Quantum Cryptography Without Switching. Physical Review Letters, 2004, 93(10), P. 170504.

13. Goncharov R., Kiselev A.D., Samsonov E., and Egorov V. Security proof for continuous-variable quantum key distribution with trusted hardware noise against general attacks. arXiv preprint arXiv:2205.05299, 5 2022.

14. Diamanti E. and Leverrier A. Distributing secret keys with quantum continuous variables: Principle, security and implementations. Entropy, 2015, 17(8), P. 6072-6092.

15. Huang D., Huang P., Lin D., and Zeng G. Long-distance continuous-variable quantum key distribution by controlling excess noise. Scienti c Reports, 2016, 6(5), P. 19201.

16. Zhang Y., Chen Z., Pirandola S., Wang X., Zhou C., Chu B., Zhao Y., Xu B., Yu S., and Guo H. Long-Distance Continuous-Variable Quantum Key Distribution over 202.81 km of Fiber. Physical Review Letters, 2020, 125(6), P. 010502.

17. Ghorai S., Grangier P., Diamanti E., and Leverrier A. Asymptotic Security of Continuous-Variable Quantum Key Distribution with a Discrete Modulation. Physical Review X, 2019, 9(6), P. 021059.

18. Lin J., Upadhyaya T., and Lu¨tkenhaus N. Asymptotic Security Analysis of Discrete-Modulated Continuous-Variable Quantum Key Distribution. Phys. Rev. X, 2019, 9(12).

19. Leverrier A.Composable Security Proof for Continuous-Variable Quantum Key Distribution with Coherent States. Physical Review Letters, 2015, 114(2), P. 070501.

20. Leverrier A. Security of Continuous-Variable Quantum Key Distribution via a Gaussian de Finetti Reduction. Physical Review Letters, 2017, 118(5), P. 200501.

21. Hosseinidehaj N., Walk N., and Ralph T.C. Optimal realistic attacks in continuous-variable quantum key distribution. Physical Review A, 2019, 99(5), P. 1-11.

22. Pirandola S. Limits and security of free-space quantum communications. Physical Review Research, 2021, 3(3), P. 013279.

23. Pirandola S.Composable security for continuous variable quantum key distribution: Trust levels and practical key rates in wired and wireless networks. Physical Review Research, 2021, 3(10), P. 043014.

24. Koashi M. and Preskill J. Secure Quantum Key Distribution with an Uncharacterized Source. Physical Review Letters, 2003, 90(2), P. 057902.

25. Makarov V., Anisimov A., and Skaar J. Effects of detector ef ciency mismatch on security of quantum cryptosystems. Physical Review A, 2006, 74(2), P. 22313.

26. Zhao Y., Fung C.H.F., Qi B., Chen C., and Lo H.K. Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems. Physical Review A, 2008, 78(4), P. 42333.

27. Zhang Y., Chen Z., Weedbrook C., Yu S., and Guo H. Continuous-variable source-device-independent quantum key distribution against general attacks. Scienti c Reports, 2020, 10(12), P. 6673.

28. Ma X. and Razavi M. Alternative schemes for measurement-device-independent quantum key distribution. Physical Review A, 2012, 86(6), P. 62319.

29. Qin H., Huang A., and Makarov V. Short pulse attack on continuous-variable quantum key distribution system. in QCrypt 2017, 2017.

30. Jouguet P., Kunz-Jacques S., and Diamanti E. Preventing calibration attacks on the local oscillator in continuous-variable quantum key distribution. Physical Review A - Atomic, Molecular, and Optical Physics, 2013, 87(6), P. 1-6.

31. Qin H., Kumar R., and Alle´aume R. Quantum hacking: Saturation attack on practical continuous-variable quantum key distribution. Physical Review A, 2016, 94(7), P. 012325.

32. Pirandola S., Ottaviani C., Spedalieri G., Weedbrook C., Braunstein S.L., Lloyd S., Gehring T., Jacobsen C.S., and Andersen U.L. High-rate measurement-device-independent quantum cryptography. Nature Photonics, 2015, 9(6), P. 397-402.

33. Grosshans F., Cerf N.J., Wenger J., Tualle-Brouri R., and Grangier P., Virtual Entanglement and Reconciliation Protocols for Quantum Cryptography with Continuous Variables. Quantum Information and Computation, 2003, 3(7), P. 535-552.

34. Devetak I. and Winter A. Distillation of secret key and entanglement from quantum states. Proceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences, 2005, 461(1), P. 207-235.

35. Pirandola S., Mancini S., Lloyd S., and Braunstein S.L. Continuous-variable quantum cryptography using two-way quantum communication. Nature Physics, 2008, 4(9), P. 726-730.

36. Papanastasiou P., Ottaviani C., and Pirandola S. Finite-size analysis of measurement-device-independent quantum cryptography with continuous variables. Physical Review A, 2017, 96(10), P. 042332.


Review

For citations:


Goncharov R., Bolychev E., Vorontsova I., Samsonov E., Egorov V. Overview of device-independent continuous-variable quantum key distribution. Nanosystems: Physics, Chemistry, Mathematics. 2022;13(3):290-298. https://doi.org/10.17586/2220-8054-2022-13-3-290-298

Views: 1


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 2220-8054 (Print)
ISSN 2305-7971 (Online)