Overcoming Intensity Limits for Long-Distance Quantum Key Distribution

被引:0
作者
Almosallam, Ibrahim [1 ]
机构
[1] Minist Commun & Informat Technol, Riyadh 12382, Saudi Arabia
关键词
quantum key distribution; decoy-state protocols; Bayesian inference; SECURITY;
D O I
10.3390/e27060568
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Quantum Key Distribution (QKD) enables the sharing of cryptographic keys secured by quantum mechanics. The BB84 protocol assumes single-photon sources, but practical systems rely on weak coherent pulses vulnerable to Photon-Number-Splitting (PNS) attacks. The Gottesman-Lo-L & uuml;tkenhaus-Preskill (GLLP) framework addresses these imperfections, deriving secure key rate bounds under limited PNS scenarios. The decoy-state protocol further improves performance by refining single-photon yield estimates, but still considers multi-photon states as insecure, thereby limiting intensities and constraining key rate and distance. More recently, finite-key security bounds for decoy-state QKD have been extended to address general attacks, ensuring security against adversaries capable of exploiting arbitrary strategies. In this work, we focus on a specific class of attacks, the generalized PNS attack, and demonstrate that higher pulse intensities can be securely used by employing Bayesian inference to estimate key parameters directly from observed data. By raising the pulse intensity to 10 photons, we achieve a 50-fold increase in key rate and a 62.2% increase in operational range (about 200 km) compared to the decoy-state protocol. Furthermore, we accurately model after-pulsing using a Hidden Markov Model (HMM) and reveal inaccuracies in decoy-state calculations that may produce erroneous key-rate estimates. While this methodology does not address all possible attacks, it provides a new approach to security proofs in QKD by shifting from worst-case assumption analysis to observation-dependent inference, advancing the reach and efficiency of discrete-variable QKD protocols.
引用
收藏
页数:58
相关论文
共 47 条
[1]  
Almosallam I., 2024, Generalized PNS
[2]  
Barrett H., 2005, Phys. Rev. A, V72, P052307
[3]  
Bennett C. H., 1984, P INT C COMP SYST SI, P175, DOI [DOI 10.1016/J.TCS.2014.05.025, 10.1016/j.tcs.2014.05.025]
[4]  
Betancourt M, 2018, Arxiv, DOI [arXiv:1701.02434, 10.48550/arXiv.1701.02434]
[5]  
Bishop CM., 2006, PATTERN RECOGN, P1122, DOI DOI 10.18637/JSS.V017.B05
[6]   Markov chain Monte Carlo convergence diagnostics: A comparative review [J].
Cowles, MK ;
Carlin, BP .
JOURNAL OF THE AMERICAN STATISTICAL ASSOCIATION, 1996, 91 (434) :883-904
[7]   HYBRID MONTE-CARLO [J].
DUANE, S ;
KENNEDY, AD ;
PENDLETON, BJ ;
ROWETH, D .
PHYSICS LETTERS B, 1987, 195 (02) :216-222
[8]  
Frobenius G, 1912, SITZBER K PREUSS AKA, P456
[9]  
Gelman A., 2014, Bayesian Data Analysis, Vthird
[10]   STOCHASTIC RELAXATION, GIBBS DISTRIBUTIONS, AND THE BAYESIAN RESTORATION OF IMAGES [J].
GEMAN, S ;
GEMAN, D .
IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, 1984, 6 (06) :721-741