cryptography

Security of decoy-state quantum key distribution with correlated bit-and-basis encoders

Curator's Take

This research tackles a critical real-world vulnerability in quantum key distribution systems that has long worried cryptographers implementing QKD in practice. While theoretical security proofs assume perfect independence between transmission rounds, actual QKD hardware inevitably introduces correlations between consecutive transmissions due to imperfect modulators and encoders. The authors have developed a more realistic security framework that accounts for these hardware imperfections while still providing rigorous mathematical guarantees against sophisticated attacks, potentially bridging the concerning gap between laboratory theory and deployed quantum cryptography systems. This work represents an important step toward making QKD deployments more trustworthy by ensuring security proofs actually match the behavior of real quantum communication devices.

— Mark Eatherly

Summary

Practical quantum key distribution (QKD) modulators inevitably introduce correlations, causing the state emitted in a given round to depend on the setting choices made in previous rounds. These correlations break the round-by-round independence structure on which many widely used security proof techniques rely, leaving a significant gap between available theoretical guarantees and the reality of practical implementations. In this work, we develop a finite-key security proof for decoy-state BB84 against general coherent attacks that rigorously incorporates correlations introduced by Alice's bit-and-basis encoder, while requiring only partial characterization of such correlations.