-
Evaluation of quantum key distribution systems against injection-locking attacks
Authors:
Jerome Wiesemann,
Fadri Grünenfelder,
Ana Blázquez,
Nino Walenta,
Davide Rusca
Abstract:
While ideal quantum key distribution (QKD) systems are well-understood, practical implementations face various vulnerabilities, such as side-channel attacks resulting from device imperfections. Current security proofs for decoy-state BB84 protocols either assume uniform phase randomization of Alice's signals, which is compromised by practical limitations and attacks like injection locking, or rely…
▽ More
While ideal quantum key distribution (QKD) systems are well-understood, practical implementations face various vulnerabilities, such as side-channel attacks resulting from device imperfections. Current security proofs for decoy-state BB84 protocols either assume uniform phase randomization of Alice's signals, which is compromised by practical limitations and attacks like injection locking, or rely on a (partially) characterized phase distribution. This work presents an experimental method to characterize the phase de-randomization from injection locking using a heterodyne detection setup, providing a lower bound on the degree of isolation required to protect QKD transmitters against injection-locking attacks. The methods presented are source-agnostic and can be used to evaluate general QKD systems against injection-locking attacks.
△ Less
Submitted 13 December, 2024;
originally announced December 2024.
-
Loss-tolerant quantum key distribution with detection efficiency mismatch
Authors:
Alessandro Marcomini,
Akihiro Mizutani,
Fadri Grünenfelder,
Marcos Curty,
Kiyoshi Tamaki
Abstract:
Current implementations of quantum key distribution (QKD) typically rely on prepare-and-measure (P&M) schemes. Unfortunately, these implementations are not completely secure, unless security proofs fully incorporate all imperfections of real devices. So far, existing proofs have primarily focused on imperfections of either the light source or the measurement device. In this paper, we establish a s…
▽ More
Current implementations of quantum key distribution (QKD) typically rely on prepare-and-measure (P&M) schemes. Unfortunately, these implementations are not completely secure, unless security proofs fully incorporate all imperfections of real devices. So far, existing proofs have primarily focused on imperfections of either the light source or the measurement device. In this paper, we establish a security proof for the loss-tolerant P&M QKD protocol that incorporates imperfections in both the source and the detectors. Specifically, we demonstrate the security of this scheme when the emitted states deviate from the ideal ones and Bob's measurement device does not meet the basis-independent detection efficiency condition. Furthermore, we conduct an experiment to characterise the detection efficiency mismatch of commercial single-photon detectors as a function of the polarisation state of the input light, and determine the expected secret key rate in the presence of state preparation flaws when using such detectors. Our work provides a way towards guaranteeing the security of actual implementations of widely deployed P&M QKD.
△ Less
Submitted 12 December, 2024;
originally announced December 2024.
-
High-speed integrated QKD system
Authors:
Rebecka Sax,
Alberto Boaron,
Gianluca Boso,
Simone Atzeni,
Andrea Crespi,
Fadri GrÜnenfelder,
Davide Rusca,
Aws Al-Saadi,
Danilo Bronzi,
Sebastian Kupijai,
Hanjo Rhee,
Roberto Osellame,
Hugo Zbinden
Abstract:
Quantum key distribution (QKD) is nowadays a well established method for generating secret keys at a distance in an information-theoretic secure way, as the secrecy of QKD relies on the laws of quantum physics and not computational complexity. In order to industrialize QKD, low-cost, mass-manufactured and practical QKD setups are required. Hence, photonic and electronic integration of the sender's…
▽ More
Quantum key distribution (QKD) is nowadays a well established method for generating secret keys at a distance in an information-theoretic secure way, as the secrecy of QKD relies on the laws of quantum physics and not computational complexity. In order to industrialize QKD, low-cost, mass-manufactured and practical QKD setups are required. Hence, photonic and electronic integration of the sender's and receiver's respective components is currently in the spotlight. Here we present a high-speed (2.5 GHz) integrated QKD setup featuring a transmitter chip in silicon photonics allowing for high-speed modulation and accurate state preparation, as well as a polarization-independent low-loss receiver chip in aluminum borosilicate glass fabricated by the femtosecond laser micromachining technique. Our system achieves raw bit error rates, quantum bit error rates and secret key rates equivalent to a much more complex state-of-the-art setup based on discrete components.
△ Less
Submitted 21 November, 2022;
originally announced November 2022.
-
Fast Single Photon Detectors and real-time Key Distillation: Enabling High Secret Key Rate QKD Systems
Authors:
Fadri Grünenfelder,
Alberto Boaron,
Matthieu Perrenoud,
Giovanni V. Resta,
Davide Rusca,
Claudio Barreiro,
Raphaël Houlmann,
Rebecka Sax,
Lorenzo Stasi,
Sylvain El-Khoury,
Esther Hänggi,
Nico Bosshard,
Félix Bussières,
Hugo Zbinden
Abstract:
Quantum Key Distribution has made continuous progress over the last 20 years and is now commercially available. However, the secret key rates (SKR) are still limited to a few Mbps. Here, we present a custom multipixel superconducting nanowire single-photon detectors and fast acquisition and real-time key distillation electronics, removing two roadblocks and allowing an increase of the SKR of more…
▽ More
Quantum Key Distribution has made continuous progress over the last 20 years and is now commercially available. However, the secret key rates (SKR) are still limited to a few Mbps. Here, we present a custom multipixel superconducting nanowire single-photon detectors and fast acquisition and real-time key distillation electronics, removing two roadblocks and allowing an increase of the SKR of more than an order of magnitude. In combination with a simple 2.5 GHz clocked time-bin quantum key distribution system, we can generate secret keys at a rate of 64 Mbps over a distance of 10.0 km and at a rate of 3.0 Mbps over a distance of 102.4 km with real-time key distillation.
△ Less
Submitted 28 October, 2022;
originally announced October 2022.
-
The limits of multiplexing quantum and classical channels: Case study of a 2.5 GHz discrete variable quantum key distribution system
Authors:
Fadri Grünenfelder,
Rebecka Sax,
Alberto Boaron,
Hugo Zbinden
Abstract:
Network integration of quantum key distribution is crucial for its future widespread deployment due to the high cost of using optical fibers dedicated for the quantum channel, only. We studied the performance of a system running a simplified BB84 protocol at 2.5 GHz repetition rate, operating in the original wavelength band, short O-band, when multiplexed with communication channels in the convent…
▽ More
Network integration of quantum key distribution is crucial for its future widespread deployment due to the high cost of using optical fibers dedicated for the quantum channel, only. We studied the performance of a system running a simplified BB84 protocol at 2.5 GHz repetition rate, operating in the original wavelength band, short O-band, when multiplexed with communication channels in the conventional wavelength band, short C-band. Our system could successfully generate secret keys over a single-mode fiber with a length of 95.5 km and with co-propagating classical signals at a launch power of 8.9 dBm. Further, we discuss the performance of an ideal system under the same conditions, showing the limits of what is possible with a discrete variable system in the O-band. We also considered a short and lossy link with 51 km optical fiber resembling a real link in a metropolitan area network. In this scenario we could exchange a secret key with a launch power up to 16.7 dBm in the classical channels.
△ Less
Submitted 6 September, 2021;
originally announced September 2021.
-
Receiver-Device-Independent Quantum Key Distribution
Authors:
Marie Ioannou,
Maria Ana Pereira,
Davide Rusca,
Fadri Grünenfelder,
Alberto Boaron,
Matthieu Perrenoud,
Alastair A. Abbott,
Pavel Sekatski,
Jean-Daniel Bancal,
Nicolas Maring,
Hugo Zbinden,
Nicolas Brunner
Abstract:
We present protocols for quantum key distribution in a prepare-and-measure setup with an asymmetric level of trust. While the device of the sender (Alice) is partially characterized, the receiver's (Bob's) device is treated as a black-box. The security of the protocols is based on the assumption that Alice's prepared states have limited overlaps, but no explicit bound on the Hilbert space dimensio…
▽ More
We present protocols for quantum key distribution in a prepare-and-measure setup with an asymmetric level of trust. While the device of the sender (Alice) is partially characterized, the receiver's (Bob's) device is treated as a black-box. The security of the protocols is based on the assumption that Alice's prepared states have limited overlaps, but no explicit bound on the Hilbert space dimension is required. The protocols are immune to attacks on the receiver's device, such as blinding attacks. The users can establish a secret key while continuously monitoring the correct functioning of their devices through observed statistics. We report a proof-of-principle demonstration, involving mostly off-the-shelf equipment, as well as a high-efficiency superconducting nanowire detector. A positive key rate is demonstrated over a 4.8 km low-loss optical fiber with finite-key analysis. The prospects of implementing these protocols over longer distances is discussed.
△ Less
Submitted 18 May, 2022; v1 submitted 29 April, 2021;
originally announced April 2021.
-
Performance and security of 5 GHz repetition rate polarization-based Quantum Key Distribution
Authors:
Fadri Grünenfelder,
Alberto Boaron,
Davide Rusca,
Anthony Martin,
Hugo Zbinden
Abstract:
We present and characterize a source for a 5 GHz clocked polarization-based simplified BB84 protocol. Secret keys are distributed over 151.5 km of standard telecom fiber at a rate of 54.5 kbps. Potentially, an increased clock frequency of the experiment introduces correlations between succeeding pulses. We discuss the impact of these correlations and propose measurements to estimate the relevant p…
▽ More
We present and characterize a source for a 5 GHz clocked polarization-based simplified BB84 protocol. Secret keys are distributed over 151.5 km of standard telecom fiber at a rate of 54.5 kbps. Potentially, an increased clock frequency of the experiment introduces correlations between succeeding pulses. We discuss the impact of these correlations and propose measurements to estimate the relevant parameters.
△ Less
Submitted 30 July, 2020;
originally announced July 2020.
-
Simple and high-speed polarization-based QKD
Authors:
Fadri Grünenfelder,
Alberto Boaron,
Davide Rusca,
Anthony Martin,
Hugo Zbinden
Abstract:
We present a simplified BB84 protocol with only three quantum states and one decoy-state level. We implement this scheme using the polarization degree of freedom at telecom wavelength. Only one pulsed laser is used in order to reduce possible side-channel attacks. The repetition rate of 625 MHz and the achieved secret bit rate of 23 bps over 200 km of standard fiber are the actual state of the art…
▽ More
We present a simplified BB84 protocol with only three quantum states and one decoy-state level. We implement this scheme using the polarization degree of freedom at telecom wavelength. Only one pulsed laser is used in order to reduce possible side-channel attacks. The repetition rate of 625 MHz and the achieved secret bit rate of 23 bps over 200 km of standard fiber are the actual state of the art.
△ Less
Submitted 30 January, 2018;
originally announced January 2018.
-
Finite-key analysis on the 1-decoy state QKD protocol
Authors:
Davide Rusca,
Alberto Boaron,
Fadri Grünenfelder,
Anthony Martin,
Hugo Zbinden
Abstract:
It has been shown that in the asymptotic case of infinite-key length the 2-decoy state QKD protocol outperforms the 1-decoy state protocol. Here, we present a finite-key analysis of the 1-decoy method. Interestingly, we find that for practical block sizes of up to $10^8$ bits, the 1-decoy protocol achieves for almost all experimental settings higher secret key rates than the 2-decoy protocol. Sinc…
▽ More
It has been shown that in the asymptotic case of infinite-key length the 2-decoy state QKD protocol outperforms the 1-decoy state protocol. Here, we present a finite-key analysis of the 1-decoy method. Interestingly, we find that for practical block sizes of up to $10^8$ bits, the 1-decoy protocol achieves for almost all experimental settings higher secret key rates than the 2-decoy protocol. Since using only one decoy is also easier to implement, we conclude that it is the best choice for practical QKD.
△ Less
Submitted 17 April, 2018; v1 submitted 10 January, 2018;
originally announced January 2018.