Security analysis of measurement-device-independent quantum conference key agreement with weak randomness
Quantum conference key agreement (QCKA) allows multiple users to distribute secret conference keys over long distances. Measurement-device-independent QCKA (MDI-QCKA) is an effective QCKA scheme, which closes all detection loopholes and greatly enhances QCKA’s security in practical application. Howe...
Main Authors: | , , , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Frontiers Media S.A.
2023-02-01
|
Series: | Frontiers in Physics |
Subjects: | |
Online Access: | https://www.frontiersin.org/articles/10.3389/fphy.2023.1101631/full |
_version_ | 1828040214998679552 |
---|---|
author | Xiao-Lei Jiang Xiao-Lei Jiang Yang Wang Yang Wang Yang Wang Yi-Fei Lu Yi-Fei Lu Jia-Ji Li Jia-Ji Li Hai-Long Zhang Hai-Long Zhang Mu-Sheng Jiang Mu-Sheng Jiang Chun Zhou Chun Zhou Wan-Su Bao Wan-Su Bao |
author_facet | Xiao-Lei Jiang Xiao-Lei Jiang Yang Wang Yang Wang Yang Wang Yi-Fei Lu Yi-Fei Lu Jia-Ji Li Jia-Ji Li Hai-Long Zhang Hai-Long Zhang Mu-Sheng Jiang Mu-Sheng Jiang Chun Zhou Chun Zhou Wan-Su Bao Wan-Su Bao |
author_sort | Xiao-Lei Jiang |
collection | DOAJ |
description | Quantum conference key agreement (QCKA) allows multiple users to distribute secret conference keys over long distances. Measurement-device-independent QCKA (MDI-QCKA) is an effective QCKA scheme, which closes all detection loopholes and greatly enhances QCKA’s security in practical application. However, an eavesdropper (Eve) may compromise the security of practical systems and acquire conference key information by taking advantage of the weak randomness from the imperfect quantum devices. In this article, we analyze the performance of the MDI-QCKA scheme based on the weak randomness model. Our simulation results show that even a small proportion of weak randomness may lead to a noticeable fluctuation in the conference key rate. For the case with finite-key size, we find that the weak randomness damages the performance of MDI-QCKA to different degrees according to the data size of total pulses transmitted. Furthermore, we infer that QCKA based on single-photon interference technology may perform better in resisting weak randomness vulnerabilities. Our work contributes to the practical security analysis of multiparty quantum communication and takes a further step in the development of quantum networks. |
first_indexed | 2024-04-10T16:53:44Z |
format | Article |
id | doaj.art-00392ae91c5f4ba28c47bf3c29b35cfb |
institution | Directory Open Access Journal |
issn | 2296-424X |
language | English |
last_indexed | 2024-04-10T16:53:44Z |
publishDate | 2023-02-01 |
publisher | Frontiers Media S.A. |
record_format | Article |
series | Frontiers in Physics |
spelling | doaj.art-00392ae91c5f4ba28c47bf3c29b35cfb2023-02-07T08:30:02ZengFrontiers Media S.A.Frontiers in Physics2296-424X2023-02-011110.3389/fphy.2023.11016311101631Security analysis of measurement-device-independent quantum conference key agreement with weak randomnessXiao-Lei Jiang0Xiao-Lei Jiang1Yang Wang2Yang Wang3Yang Wang4Yi-Fei Lu5Yi-Fei Lu6Jia-Ji Li7Jia-Ji Li8Hai-Long Zhang9Hai-Long Zhang10Mu-Sheng Jiang11Mu-Sheng Jiang12Chun Zhou13Chun Zhou14Wan-Su Bao15Wan-Su Bao16Henan Key Laboratory of Quantum Information and Cryptography, SSF IEU, Zhengzhou, ChinaSynergetic Innovation Center of Quantum Information and Quantum Physics, University of Science and Technology of China, Hefei, ChinaHenan Key Laboratory of Quantum Information and Cryptography, SSF IEU, Zhengzhou, ChinaSynergetic Innovation Center of Quantum Information and Quantum Physics, University of Science and Technology of China, Hefei, ChinaNational Laboratory of Solid State Microstructures, School of Physics and Collaborative Innovation Center of Advanced Microstructures, Nanjing University, Nanjing, ChinaHenan Key Laboratory of Quantum Information and Cryptography, SSF IEU, Zhengzhou, ChinaSynergetic Innovation Center of Quantum Information and Quantum Physics, University of Science and Technology of China, Hefei, ChinaHenan Key Laboratory of Quantum Information and Cryptography, SSF IEU, Zhengzhou, ChinaSynergetic Innovation Center of Quantum Information and Quantum Physics, University of Science and Technology of China, Hefei, ChinaHenan Key Laboratory of Quantum Information and Cryptography, SSF IEU, Zhengzhou, ChinaSynergetic Innovation Center of Quantum Information and Quantum Physics, University of Science and Technology of China, Hefei, ChinaHenan Key Laboratory of Quantum Information and Cryptography, SSF IEU, Zhengzhou, ChinaSynergetic Innovation Center of Quantum Information and Quantum Physics, University of Science and Technology of China, Hefei, ChinaHenan Key Laboratory of Quantum Information and Cryptography, SSF IEU, Zhengzhou, ChinaSynergetic Innovation Center of Quantum Information and Quantum Physics, University of Science and Technology of China, Hefei, ChinaHenan Key Laboratory of Quantum Information and Cryptography, SSF IEU, Zhengzhou, ChinaSynergetic Innovation Center of Quantum Information and Quantum Physics, University of Science and Technology of China, Hefei, ChinaQuantum conference key agreement (QCKA) allows multiple users to distribute secret conference keys over long distances. Measurement-device-independent QCKA (MDI-QCKA) is an effective QCKA scheme, which closes all detection loopholes and greatly enhances QCKA’s security in practical application. However, an eavesdropper (Eve) may compromise the security of practical systems and acquire conference key information by taking advantage of the weak randomness from the imperfect quantum devices. In this article, we analyze the performance of the MDI-QCKA scheme based on the weak randomness model. Our simulation results show that even a small proportion of weak randomness may lead to a noticeable fluctuation in the conference key rate. For the case with finite-key size, we find that the weak randomness damages the performance of MDI-QCKA to different degrees according to the data size of total pulses transmitted. Furthermore, we infer that QCKA based on single-photon interference technology may perform better in resisting weak randomness vulnerabilities. Our work contributes to the practical security analysis of multiparty quantum communication and takes a further step in the development of quantum networks.https://www.frontiersin.org/articles/10.3389/fphy.2023.1101631/fullmeasurement-device-independentconference key agreementweak randomnessfinite-keysecurity analysis |
spellingShingle | Xiao-Lei Jiang Xiao-Lei Jiang Yang Wang Yang Wang Yang Wang Yi-Fei Lu Yi-Fei Lu Jia-Ji Li Jia-Ji Li Hai-Long Zhang Hai-Long Zhang Mu-Sheng Jiang Mu-Sheng Jiang Chun Zhou Chun Zhou Wan-Su Bao Wan-Su Bao Security analysis of measurement-device-independent quantum conference key agreement with weak randomness Frontiers in Physics measurement-device-independent conference key agreement weak randomness finite-key security analysis |
title | Security analysis of measurement-device-independent quantum conference key agreement with weak randomness |
title_full | Security analysis of measurement-device-independent quantum conference key agreement with weak randomness |
title_fullStr | Security analysis of measurement-device-independent quantum conference key agreement with weak randomness |
title_full_unstemmed | Security analysis of measurement-device-independent quantum conference key agreement with weak randomness |
title_short | Security analysis of measurement-device-independent quantum conference key agreement with weak randomness |
title_sort | security analysis of measurement device independent quantum conference key agreement with weak randomness |
topic | measurement-device-independent conference key agreement weak randomness finite-key security analysis |
url | https://www.frontiersin.org/articles/10.3389/fphy.2023.1101631/full |
work_keys_str_mv | AT xiaoleijiang securityanalysisofmeasurementdeviceindependentquantumconferencekeyagreementwithweakrandomness AT xiaoleijiang securityanalysisofmeasurementdeviceindependentquantumconferencekeyagreementwithweakrandomness AT yangwang securityanalysisofmeasurementdeviceindependentquantumconferencekeyagreementwithweakrandomness AT yangwang securityanalysisofmeasurementdeviceindependentquantumconferencekeyagreementwithweakrandomness AT yangwang securityanalysisofmeasurementdeviceindependentquantumconferencekeyagreementwithweakrandomness AT yifeilu securityanalysisofmeasurementdeviceindependentquantumconferencekeyagreementwithweakrandomness AT yifeilu securityanalysisofmeasurementdeviceindependentquantumconferencekeyagreementwithweakrandomness AT jiajili securityanalysisofmeasurementdeviceindependentquantumconferencekeyagreementwithweakrandomness AT jiajili securityanalysisofmeasurementdeviceindependentquantumconferencekeyagreementwithweakrandomness AT hailongzhang securityanalysisofmeasurementdeviceindependentquantumconferencekeyagreementwithweakrandomness AT hailongzhang securityanalysisofmeasurementdeviceindependentquantumconferencekeyagreementwithweakrandomness AT mushengjiang securityanalysisofmeasurementdeviceindependentquantumconferencekeyagreementwithweakrandomness AT mushengjiang securityanalysisofmeasurementdeviceindependentquantumconferencekeyagreementwithweakrandomness AT chunzhou securityanalysisofmeasurementdeviceindependentquantumconferencekeyagreementwithweakrandomness AT chunzhou securityanalysisofmeasurementdeviceindependentquantumconferencekeyagreementwithweakrandomness AT wansubao securityanalysisofmeasurementdeviceindependentquantumconferencekeyagreementwithweakrandomness AT wansubao securityanalysisofmeasurementdeviceindependentquantumconferencekeyagreementwithweakrandomness |