Security and performance of continuous-variable quantum key distribution systems. (Performance et sécurité de dispositifs de distribution quantique de clés à variables continues)

نویسنده

  • Paul Jouguet
چکیده

This thesis focuses on a cryptographic primitive that allows two distant parties, usually called Alice and Bob, to generate an arbitrary amount of secret key even in the presence of an eavesdropper, provided that they share a short initial secret message. This primitive is called quantum key distribution, or in short QKD; and differs from classical key distribution primitives in the sense that no assumption on the capacities of the eavesdropper is required to prove the security of the scheme. While several QKD protocols exist, we focus our study on continuous-variable protocols, which encode the information on the quadratures of the electromagnetic field. Some of these protocols are of particular interest because they can be implemented with standard fiber-based telecommunication components and feature an interferometric detection scheme that exhibits a high resistance to the noise induced by potential adjacent classical channels that propagate on the same optical fiber. The advantage of QKD over classical primitives relies on fundamental quantum physics principles such as the uncertainty principle: in a carefully designed QKD protocol, an eavesdropper cannot interact with the quantum system without introducing some noise which can be quantified by the parties of the protocol. However, even when there is no active eavesdropper, some errors inevitably occur during the transmission of quantum states between Alice and Bob. Alice and Bob must correct these errors to agree on a common bit string. Since this step is done by revealing some information on a public channel, it results in a limitation of the protocol in terms of tolerance to noise and losses. To overcome this, we develop efficient errorcorrecting codes that allow to extend the range of a QKD protocol based on a Gaussian modulation of the quadratures of the electromagnetic field. Security proofs for QKD protocols typically consider an ideal description of the protocol. In practice, however, one has to consider the distance between a practical implementation of a QKD protocol and its theoretical description. We study different aspects of a practical implementation of a Gaussian continuous-variable QKD protocol, such as the imperfect statistical estimation (in the finite-size scenario) of the parameters that are relevant to the security of the protocol and the quality of the practical Gaussian modulation of coherent states. We also consider a calibration attack that can lead to a powerful eavesdropping strategy. We demonstrate experimentally the distribution of secret keys over a 80 km fiber link when taking into account all the known imperfections of our system. Finally, we make initial deployment tests involving our QKD system and wavelength division multiplexed (WDM) classical channels on the same fiber link. We also demonstrate the long-term stability of our system in combination with high-speed classical encryptors.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Satisfiability of General Intruder Constraints with and without a Set Constructor

Many decision problems on security protocols can be reduced to solving socalled intruder constraints in the Dolev Yao model. Most constraint solving procedures for cryptographic protocol security rely on two properties of constraint systems called knowledge monotonicity and variable-origination. In this work we relax these restrictions by giving an NP decision procedure for solving general intr...

متن کامل

Florian Kaiser Photonic entanglement engineering for quantum information applications and fundamental quantum optics

The aim of this thesis is to develop sources of photonic entanglement to study both quantum networkingtasks and some of the foundations of quantum physics. To this end, three high-performance sourcesare developed, each of them taking extensively advantage of standard telecom fibre optics components.The first source generates polarization entanglement via deterministic pair separatio...

متن کامل

فایل کامل مجلّه مطالعات زبان فرانسه دو فصلنامه علمی پژوهشی زبان فرانسه دانشکده زبانهای خارجی دانشگاه اصفهان

Tâ ÇÉÅ wx W|xâ Revue des Études de la Langue Française Revue semestrielle de la Faculté des Langues Étrangères de l'Université d'Ispahan Cinquième année, N° 8 Printemps-Eté 2013, ISSN 2008- 6571 ISSN électronique 2322-469X Cette revue est indexée dans: Ulrichsweb: global serials directory http://ulrichsweb.serialssolutions.com Doaj: Directory of Open Access Journals http://www.doaj.org ...

متن کامل

Managing Security of Grid Architecture with a Grid Security Operation Center

Due to the nature of grid computing networks, security pitfalls are plethora and adversaries are sneaking to launch attacks. Keeping this scope in mind, we will discuss our proposed solution for securing grid computing networks that we have called gSOC (Grid Security Operation Center). The main advantage of gSOC is that it can give a global view of security of the entire grid infrastructure. Th...

متن کامل

Challenging the Security of CBIR Systems

Content-Based Image Retrieval Systems are now commonly used as a ltering mechanism against the piracy of multimedia contents. Many publications in the last few years have proposed very robust schemes where pirated contents are detected despite severe modi cations. But none of these systems have addressed the piracy problem from a security perspective. It is now time to check whether they are se...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013