2021
DOI: 10.1038/s41534-020-00358-y
|View full text |Cite
|
Sign up to set email alerts
|

Secure quantum key distribution with a subset of malicious devices

Abstract: The malicious manipulation of quantum key distribution (QKD) hardware is a serious threat to its security, as, typically, neither end users nor QKD manufacturers can validate the integrity of every component of their QKD system in practice. One possible approach to re-establish the security of QKD is to use a redundant number of devices. Following this idea, we address various corruption models of the possibly malicious devices and show that, compared to the most conservative model of active and collaborative … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
2

Relationship

3
5

Authors

Journals

citations
Cited by 13 publications
(8 citation statements)
references
References 39 publications
0
8
0
Order By: Relevance
“…[42,43,76] Recently, the performance of the four-intensity protocol was studied with leaky sources and also with a subset of malicious sources. [45,77] For a longer distance or higher key rate, one may refer to the twin-field (TF) QKD [78] and its variants, for example, the sendingor-not-sending (SNS) protocol, [79] the TF* protocol, [80] the CAL protocol, [81] and the NPP protocol. [82] The SNS protocol [79] and CAL protocol [81] are secure under general attacks and robust to misalignment errors and finite data size.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…[42,43,76] Recently, the performance of the four-intensity protocol was studied with leaky sources and also with a subset of malicious sources. [45,77] For a longer distance or higher key rate, one may refer to the twin-field (TF) QKD [78] and its variants, for example, the sendingor-not-sending (SNS) protocol, [79] the TF* protocol, [80] the CAL protocol, [81] and the NPP protocol. [82] The SNS protocol [79] and CAL protocol [81] are secure under general attacks and robust to misalignment errors and finite data size.…”
Section: Discussionmentioning
confidence: 99%
“…[ 42,43,76 ] Recently, the performance of the four‐intensity protocol was studied with leaky sources and also with a subset of malicious sources. [ 45,77 ]…”
Section: Discussionmentioning
confidence: 99%
“…That being said, DI-QKD may also be feasible even if quantum theory were to be superseded by another physical theory that respects the nosignalling principle (Barrett et al, 2005). As quantum theory's validity remains unchallenged today, it shall 12 When considering DI-QKD implementation with multiple pairs of devices, it was shown in (Curty and Lo, 2019;Zapatero and Curty, 2021) that DI-QKD can still be secure with the aid of secret sharing if some but not all of the devices are malicious.…”
Section: Assumptionsmentioning
confidence: 99%
“…Also, let p d (δ A ) stand for the dark count probability of each of Bob's photo-detectors (polarization misalignment occurring in the channel). The model is [15,26] Z a,N…”
Section: Simulationsmentioning
confidence: 99%