4.7 Article

Secure quantum key distribution with a subset of malicious devices

Journal

NPJ QUANTUM INFORMATION
Volume 7, Issue 1, Pages -

Publisher

NATURE PORTFOLIO
DOI: 10.1038/s41534-020-00358-y

Keywords

-

Funding

  1. Spanish Ministry of Economy and Competitiveness (MINECO)
  2. Fondo Europeo de Desarrollo Regional (FEDER) [TEC2017-88243-R]
  3. European Union [675662]
  4. FPU scholarship from the Spanish Ministry of Education
  5. Marie Curie Actions (MSCA) [675662] Funding Source: Marie Curie Actions (MSCA)

Ask authors/readers for more resources

The malicious manipulation of quantum key distribution (QKD) hardware poses a serious threat to security. Using a redundant number of devices can enhance key rate and reduce necessary resources. In practical situations, the finite-size secret key rate is similar to the standard scenario assuming trusted devices.
The malicious manipulation of quantum key distribution (QKD) hardware is a serious threat to its security, as, typically, neither end users nor QKD manufacturers can validate the integrity of every component of their QKD system in practice. One possible approach to re-establish the security of QKD is to use a redundant number of devices. Following this idea, we address various corruption models of the possibly malicious devices and show that, compared to the most conservative model of active and collaborative corrupted devices, natural assumptions allow to significantly enhance the secret key rate or considerably reduce the necessary resources. Furthermore, we show that, for most practical situations, the resulting finite-size secret key rate is similar to that of the standard scenario assuming trusted devices.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available