Security analysis of measurement-device-independent quantum conference key agreement with weak randomness

Quantum conference key agreement (QCKA) allows multiple users to distribute secret conference keys over long distances. Measurement-device-independent QCKA (MDI-QCKA) is an effective QCKA scheme, which closes all detection loopholes and greatly enhances QCKA’s security in practical application. Howe...

Full description

Bibliographic Details
Main Authors: Xiao-Lei Jiang, Yang Wang, Yi-Fei Lu, Jia-Ji Li, Hai-Long Zhang, Mu-Sheng Jiang, Chun Zhou, Wan-Su Bao
Format: Article
Language:English
Published: Frontiers Media S.A. 2023-02-01
Series:Frontiers in Physics
Subjects:
Online Access:https://www.frontiersin.org/articles/10.3389/fphy.2023.1101631/full
_version_ 1828040214998679552
author Xiao-Lei Jiang
Xiao-Lei Jiang
Yang Wang
Yang Wang
Yang Wang
Yi-Fei Lu
Yi-Fei Lu
Jia-Ji Li
Jia-Ji Li
Hai-Long Zhang
Hai-Long Zhang
Mu-Sheng Jiang
Mu-Sheng Jiang
Chun Zhou
Chun Zhou
Wan-Su Bao
Wan-Su Bao
author_facet Xiao-Lei Jiang
Xiao-Lei Jiang
Yang Wang
Yang Wang
Yang Wang
Yi-Fei Lu
Yi-Fei Lu
Jia-Ji Li
Jia-Ji Li
Hai-Long Zhang
Hai-Long Zhang
Mu-Sheng Jiang
Mu-Sheng Jiang
Chun Zhou
Chun Zhou
Wan-Su Bao
Wan-Su Bao
author_sort Xiao-Lei Jiang
collection DOAJ
description Quantum conference key agreement (QCKA) allows multiple users to distribute secret conference keys over long distances. Measurement-device-independent QCKA (MDI-QCKA) is an effective QCKA scheme, which closes all detection loopholes and greatly enhances QCKA’s security in practical application. However, an eavesdropper (Eve) may compromise the security of practical systems and acquire conference key information by taking advantage of the weak randomness from the imperfect quantum devices. In this article, we analyze the performance of the MDI-QCKA scheme based on the weak randomness model. Our simulation results show that even a small proportion of weak randomness may lead to a noticeable fluctuation in the conference key rate. For the case with finite-key size, we find that the weak randomness damages the performance of MDI-QCKA to different degrees according to the data size of total pulses transmitted. Furthermore, we infer that QCKA based on single-photon interference technology may perform better in resisting weak randomness vulnerabilities. Our work contributes to the practical security analysis of multiparty quantum communication and takes a further step in the development of quantum networks.
first_indexed 2024-04-10T16:53:44Z
format Article
id doaj.art-00392ae91c5f4ba28c47bf3c29b35cfb
institution Directory Open Access Journal
issn 2296-424X
language English
last_indexed 2024-04-10T16:53:44Z
publishDate 2023-02-01
publisher Frontiers Media S.A.
record_format Article
series Frontiers in Physics
spelling doaj.art-00392ae91c5f4ba28c47bf3c29b35cfb2023-02-07T08:30:02ZengFrontiers Media S.A.Frontiers in Physics2296-424X2023-02-011110.3389/fphy.2023.11016311101631Security analysis of measurement-device-independent quantum conference key agreement with weak randomnessXiao-Lei Jiang0Xiao-Lei Jiang1Yang Wang2Yang Wang3Yang Wang4Yi-Fei Lu5Yi-Fei Lu6Jia-Ji Li7Jia-Ji Li8Hai-Long Zhang9Hai-Long Zhang10Mu-Sheng Jiang11Mu-Sheng Jiang12Chun Zhou13Chun Zhou14Wan-Su Bao15Wan-Su Bao16Henan Key Laboratory of Quantum Information and Cryptography, SSF IEU, Zhengzhou, ChinaSynergetic Innovation Center of Quantum Information and Quantum Physics, University of Science and Technology of China, Hefei, ChinaHenan Key Laboratory of Quantum Information and Cryptography, SSF IEU, Zhengzhou, ChinaSynergetic Innovation Center of Quantum Information and Quantum Physics, University of Science and Technology of China, Hefei, ChinaNational Laboratory of Solid State Microstructures, School of Physics and Collaborative Innovation Center of Advanced Microstructures, Nanjing University, Nanjing, ChinaHenan Key Laboratory of Quantum Information and Cryptography, SSF IEU, Zhengzhou, ChinaSynergetic Innovation Center of Quantum Information and Quantum Physics, University of Science and Technology of China, Hefei, ChinaHenan Key Laboratory of Quantum Information and Cryptography, SSF IEU, Zhengzhou, ChinaSynergetic Innovation Center of Quantum Information and Quantum Physics, University of Science and Technology of China, Hefei, ChinaHenan Key Laboratory of Quantum Information and Cryptography, SSF IEU, Zhengzhou, ChinaSynergetic Innovation Center of Quantum Information and Quantum Physics, University of Science and Technology of China, Hefei, ChinaHenan Key Laboratory of Quantum Information and Cryptography, SSF IEU, Zhengzhou, ChinaSynergetic Innovation Center of Quantum Information and Quantum Physics, University of Science and Technology of China, Hefei, ChinaHenan Key Laboratory of Quantum Information and Cryptography, SSF IEU, Zhengzhou, ChinaSynergetic Innovation Center of Quantum Information and Quantum Physics, University of Science and Technology of China, Hefei, ChinaHenan Key Laboratory of Quantum Information and Cryptography, SSF IEU, Zhengzhou, ChinaSynergetic Innovation Center of Quantum Information and Quantum Physics, University of Science and Technology of China, Hefei, ChinaQuantum conference key agreement (QCKA) allows multiple users to distribute secret conference keys over long distances. Measurement-device-independent QCKA (MDI-QCKA) is an effective QCKA scheme, which closes all detection loopholes and greatly enhances QCKA’s security in practical application. However, an eavesdropper (Eve) may compromise the security of practical systems and acquire conference key information by taking advantage of the weak randomness from the imperfect quantum devices. In this article, we analyze the performance of the MDI-QCKA scheme based on the weak randomness model. Our simulation results show that even a small proportion of weak randomness may lead to a noticeable fluctuation in the conference key rate. For the case with finite-key size, we find that the weak randomness damages the performance of MDI-QCKA to different degrees according to the data size of total pulses transmitted. Furthermore, we infer that QCKA based on single-photon interference technology may perform better in resisting weak randomness vulnerabilities. Our work contributes to the practical security analysis of multiparty quantum communication and takes a further step in the development of quantum networks.https://www.frontiersin.org/articles/10.3389/fphy.2023.1101631/fullmeasurement-device-independentconference key agreementweak randomnessfinite-keysecurity analysis
spellingShingle Xiao-Lei Jiang
Xiao-Lei Jiang
Yang Wang
Yang Wang
Yang Wang
Yi-Fei Lu
Yi-Fei Lu
Jia-Ji Li
Jia-Ji Li
Hai-Long Zhang
Hai-Long Zhang
Mu-Sheng Jiang
Mu-Sheng Jiang
Chun Zhou
Chun Zhou
Wan-Su Bao
Wan-Su Bao
Security analysis of measurement-device-independent quantum conference key agreement with weak randomness
Frontiers in Physics
measurement-device-independent
conference key agreement
weak randomness
finite-key
security analysis
title Security analysis of measurement-device-independent quantum conference key agreement with weak randomness
title_full Security analysis of measurement-device-independent quantum conference key agreement with weak randomness
title_fullStr Security analysis of measurement-device-independent quantum conference key agreement with weak randomness
title_full_unstemmed Security analysis of measurement-device-independent quantum conference key agreement with weak randomness
title_short Security analysis of measurement-device-independent quantum conference key agreement with weak randomness
title_sort security analysis of measurement device independent quantum conference key agreement with weak randomness
topic measurement-device-independent
conference key agreement
weak randomness
finite-key
security analysis
url https://www.frontiersin.org/articles/10.3389/fphy.2023.1101631/full
work_keys_str_mv AT xiaoleijiang securityanalysisofmeasurementdeviceindependentquantumconferencekeyagreementwithweakrandomness
AT xiaoleijiang securityanalysisofmeasurementdeviceindependentquantumconferencekeyagreementwithweakrandomness
AT yangwang securityanalysisofmeasurementdeviceindependentquantumconferencekeyagreementwithweakrandomness
AT yangwang securityanalysisofmeasurementdeviceindependentquantumconferencekeyagreementwithweakrandomness
AT yangwang securityanalysisofmeasurementdeviceindependentquantumconferencekeyagreementwithweakrandomness
AT yifeilu securityanalysisofmeasurementdeviceindependentquantumconferencekeyagreementwithweakrandomness
AT yifeilu securityanalysisofmeasurementdeviceindependentquantumconferencekeyagreementwithweakrandomness
AT jiajili securityanalysisofmeasurementdeviceindependentquantumconferencekeyagreementwithweakrandomness
AT jiajili securityanalysisofmeasurementdeviceindependentquantumconferencekeyagreementwithweakrandomness
AT hailongzhang securityanalysisofmeasurementdeviceindependentquantumconferencekeyagreementwithweakrandomness
AT hailongzhang securityanalysisofmeasurementdeviceindependentquantumconferencekeyagreementwithweakrandomness
AT mushengjiang securityanalysisofmeasurementdeviceindependentquantumconferencekeyagreementwithweakrandomness
AT mushengjiang securityanalysisofmeasurementdeviceindependentquantumconferencekeyagreementwithweakrandomness
AT chunzhou securityanalysisofmeasurementdeviceindependentquantumconferencekeyagreementwithweakrandomness
AT chunzhou securityanalysisofmeasurementdeviceindependentquantumconferencekeyagreementwithweakrandomness
AT wansubao securityanalysisofmeasurementdeviceindependentquantumconferencekeyagreementwithweakrandomness
AT wansubao securityanalysisofmeasurementdeviceindependentquantumconferencekeyagreementwithweakrandomness