Quantum Key Recycling with Optimal Key Recycling Rate based on Error
Rate
- URL: http://arxiv.org/abs/2004.11596v5
- Date: Thu, 11 Jun 2020 21:12:02 GMT
- Title: Quantum Key Recycling with Optimal Key Recycling Rate based on Error
Rate
- Authors: Yu-Chin Lu, Chia-Wei Tsai and Tzonelih Hwang
- Abstract summary: We propose a new Quantum Key Recycling protocol, which can tolerate the noise in the quantum channel.
Our QKR protocol recycles the used keys according to the error rate.
The key recycling rate of the pre-shared keys in our QKR protocol is optimized depending on the real error rate in the quantum channel.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: We propose a new Quantum Key Recycling (QKR) protocol, which can tolerate the
noise in the quantum channel. Our QKR protocol recycles the used keys according
to the error rate. The key recycling rate of the pre-shared keys in our QKR
protocol is optimized depending on the real error rate in the quantum channel.
And our QKR protocol has higher efficiency than the exiting QKR protocol with
error-tolerance. The security proof shows the security of the recycled keys is
universal composable.
Related papers
- Towards efficient and secure quantum-classical communication networks [47.27205216718476]
There are two primary approaches to achieving quantum-resistant security: quantum key distribution (QKD) and post-quantum cryptography (PQC)
We introduce the pros and cons of these protocols and explore how they can be combined to achieve a higher level of security and/or improved performance in key distribution.
We hope our discussion inspires further research into the design of hybrid cryptographic protocols for quantum-classical communication networks.
arXiv Detail & Related papers (2024-11-01T23:36:19Z) - Increasing Interference Detection in Quantum Cryptography using the Quantum Fourier Transform [0.0]
We present two quantum cryptographic protocols leveraging the quantum Fourier transform (QFT)
The foremost of these protocols is a novel QKD method that leverages this effectiveness of the QFT.
We additionally show how existing quantum encryption methods can be augmented with a QFT-based approach to improve eavesdropping detection.
arXiv Detail & Related papers (2024-04-18T21:04:03Z) - Practical quantum secure direct communication with squeezed states [55.41644538483948]
We report the first table-top experimental demonstration of a CV-QSDC system and assess its security.
This realization paves the way into future threat-less quantum metropolitan networks, compatible with coexisting advanced wavelength division multiplexing (WDM) systems.
arXiv Detail & Related papers (2023-06-25T19:23:42Z) - Optimizing state-discrimination receivers for continuous-variable
quantum key distribution over a wiretap channel [1.3108652488669736]
We address a continuous-variable quantum key distribution protocol employing quaternary phase-shift-keying (QPSK) of coherent states.
We consider a pure-loss quantum wiretap channel, in which a possible eavesdropper is limited to collect the sole channel losses.
arXiv Detail & Related papers (2023-06-20T12:26:06Z) - Data post-processing for the one-way heterodyne protocol under
composable finite-size security [62.997667081978825]
We study the performance of a practical continuous-variable (CV) quantum key distribution protocol.
We focus on the Gaussian-modulated coherent-state protocol with heterodyne detection in a high signal-to-noise ratio regime.
This allows us to study the performance for practical implementations of the protocol and optimize the parameters connected to the steps above.
arXiv Detail & Related papers (2022-05-20T12:37:09Z) - Composably secure data processing for Gaussian-modulated continuous
variable quantum key distribution [58.720142291102135]
Continuous-variable quantum key distribution (QKD) employs the quadratures of a bosonic mode to establish a secret key between two remote parties.
We consider a protocol with homodyne detection in the general setting of composable finite-size security.
In particular, we analyze the high signal-to-noise regime which requires the use of high-rate (non-binary) low-density parity check codes.
arXiv Detail & Related papers (2021-03-30T18:02:55Z) - Round-robin differential phase-time-shifting protocol for quantum key
distribution: theory and experiment [58.03659958248968]
Quantum key distribution (QKD) allows the establishment of common cryptographic keys among distant parties.
Recently, a QKD protocol that circumvents the need for monitoring signal disturbance, has been proposed and demonstrated in initial experiments.
We derive the security proofs of the round-robin differential phase-time-shifting protocol in the collective attack scenario.
Our results show that the RRDPTS protocol can achieve higher secret key rate in comparison with the RRDPS, in the condition of high quantum bit error rate.
arXiv Detail & Related papers (2021-03-15T15:20:09Z) - Quantum Conference Key Agreement with Photon Loss [0.0]
Conference key agreement (CKA) is an information processing task where more than two parties want to share a common secret key.
We present a loss-resilient protocol for CKA, based on redundant encoding and error correction.
arXiv Detail & Related papers (2021-01-05T12:31:03Z) - The QQUIC Transport Protocol: Quantum assisted UDP Internet Connections [11.223026257748657]
Quantum key distribution, in 1984, is a commercialized secure communication method which enables two parties to produce shared random secret key by the nature of quantum mechanics.
We propose QQUIC (Quantum assisted Quick Internet Connections) transport protocol, which modifies the famous QUIC transport protocol by employing the quantum key distribution instead of the original classical algorithms in the key exchanging stage.
arXiv Detail & Related papers (2020-06-01T00:44:58Z) - Quantum Key Recycling can share key more efficient than BB84 [0.0]
We calculate the key sharing rate of Lu et al.'s Quantum Key Recycling (QKR) protocol.
We compare the key sharing rate of the QKR protocol to the rate of the Quantum Key Distribution (QKD) protocols.
arXiv Detail & Related papers (2020-05-29T10:16:07Z) - Backflash Light as a Security Vulnerability in Quantum Key Distribution
Systems [77.34726150561087]
We review the security vulnerabilities of quantum key distribution (QKD) systems.
We mainly focus on a particular effect known as backflash light, which can be a source of eavesdropping attacks.
arXiv Detail & Related papers (2020-03-23T18:23:12Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.