当前位置: X-MOL 学术Quantum Sci. Technol. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Security of partially corrupted quantum repeater networks
Quantum Science and Technology ( IF 5.6 ) Pub Date : 2024-10-14 , DOI: 10.1088/2058-9565/ad7882
Adrian Harkness, Walter O Krawec, Bing Wang

Quantum Key Distribution allows two parties to establish a secret key that is secure against computationally unbounded adversaries. To extend the distance between parties, quantum networks are vital. Typically, security in such scenarios assumes the absolute worst case: namely, an adversary has complete control over all repeaters and fiber links in a network and is able to replace them with perfect devices, thus allowing her to hide her attack within the expected natural noise. In a large-scale network, however, such a powerful attack may be infeasible. In this paper, we analyze the case where the adversary can only corrupt a subset of the repeater network connecting Alice and Bob, while some portion of the network near Alice and Bob may be considered safe from attack (though still noisy). We derive a rigorous finite key proof of security assuming this attack model, and show that improved performance and noise tolerances are possible. Our proof methods may be useful to other researchers investigating partially corrupted quantum networks, and our main result may be beneficial to future network operators.

中文翻译:


部分损坏的量子中继器网络的安全性



量子密钥分发允许双方建立一个安全的密钥,以抵御计算上不受限制的对手。为了拉长各方之间的距离,量子网络至关重要。通常,在这种情况下,安全性会假设绝对最坏的情况:即,攻击者可以完全控制网络中的所有中继器和光纤链路,并能够用完美的设备替换它们,从而允许她将攻击隐藏在预期的自然噪音中。然而,在大规模网络中,这种强大的攻击可能是不可行的。在本文中,我们分析了这样一种情况:攻击者只能破坏连接 Alice 和 Bob 的中继器网络的子集,而 Alice 和 Bob 附近的网络部分可能被认为不受攻击(尽管仍然有噪音)。假设这种攻击模型,我们推导出了一个严格的有限密钥安全证明,并表明提高性能和噪声容忍度是可能的。我们的证明方法可能对其他研究部分损坏的量子网络的研究人员有用,我们的主要结果可能对未来的网络运营商有益。
更新日期:2024-10-14
down
wechat
bug