Expand this Topic clickable element to expand a topic
Skip to content
Optica Publishing Group

Sifting scheme for continuous-variable quantum key distribution with short samples

Not Accessible

Your library or personal account may give you access

Abstract

Preventing the secret key from being stolen is an important issue in practical quantum key distribution systems. In the sifting step, the legitimate parties discard the useless portion of the raw data to form the sifted key. This step is executed at high speed to support the high repetition frequency of the systems without guaranteeing the security of the raw data. In practical systems, useless data contain abnormal data and the key measured by the legitimate party on different bases. Here we propose a sifting scheme based on machine learning that can monitor anomaly quantum signal disturbances in practical continuous-variable quantum key distribution systems. It randomly samples small amounts of data from the data block and uses short samples to preliminarily sift the abnormal one. The results show that the model can quickly distinguish normal communication from most common attacks with the cost of a small part of the raw keys and improve system performance under attacks. In principle, the model can also be generalized and applied to discrete-variable quantum key distribution systems and further enhance the security of quantum key distribution.

© 2022 Optical Society of America

Full Article  |  PDF Article
More Like This
Saturation attack on discretely modulated continuous-variable quantum key distribution over an atmospheric turbulence channel

Wenqi Jiang, Hang Zhang, Di Jin, and Ying Guo
J. Opt. Soc. Am. B 39(11) 2889-2895 (2022)

Continuous-variable quantum key distribution based on a faster-than-Nyquist scheme

Yaxi Pan, Ling Zhang, Ying Guo, and Duan Huang
J. Opt. Soc. Am. B 37(3) 665-672 (2020)

Supplementary Material (1)

NameDescription
Supplement 1       Supplemental document.

Data availability

Data underlying the results presented in this paper are not publicly available at this time but may be obtained from the authors upon reasonable request.

Cited By

You do not have subscription access to this journal. Cited by links are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Figures (6)

You do not have subscription access to this journal. Figure files are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Tables (1)

You do not have subscription access to this journal. Article tables are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Equations (10)

You do not have subscription access to this journal. Equations are available to subscribers only. You may subscribe either as an Optica member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access Optica Member Subscription

Select as filters


Select Topics Cancel
© Copyright 2024 | Optica Publishing Group. All rights reserved, including rights for text and data mining and training of artificial technologies or similar technologies.