Trusted detector noise analysis for discrete modulation schemes of
continuous-variable quantum key distribution
- URL: http://arxiv.org/abs/2006.06166v3
- Date: Sun, 13 Dec 2020 22:19:28 GMT
- Title: Trusted detector noise analysis for discrete modulation schemes of
continuous-variable quantum key distribution
- Authors: Jie Lin and Norbert L\"utkenhaus
- Abstract summary: Discrete-modulated continuous-variable quantum key distribution protocols are promising candidates for large-scale deployment.
We calculate key rates against collective attacks in the trusted detector noise scenario.
Our results show that we can thus cut out most of the effect of detector noise and obtain key rates similar to those had we access to ideal detectors.
- Score: 4.977851927269835
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Discrete-modulated continuous-variable quantum key distribution protocols are
promising candidates for large-scale deployment due to the large technological
overlap with deployed modern optical communication devices. The security of
discrete modulation schemes has previously analyzed in the ideal detector
scenario in the asymptotic limit. In this work, we calculate asymptotic key
rates against collective attacks in the trusted detector noise scenario. Our
results show that we can thus cut out most of the effect of detector noise and
obtain asymptotic key rates similar to those had we access to ideal detectors.
Related papers
- Trusted source noise model of discrete-modulated continuous-variable quantum key distribution [8.019408649120262]
discrete-modulated continuous-variable quantum key distribution.
Traditional approach is to assume that eavesdroppers can control all of the source noise.
We tailor a trusted model specifically for the discrete-modulated protocol and upgrade the security analysis accordingly.
arXiv Detail & Related papers (2024-07-29T10:35:33Z) - General treatment of Gaussian trusted noise in continuous variable
quantum key distribution [1.0499611180329804]
A trusted device scenario assumes that an adversary has no access to imperfections such as electronic noises in the detector is expected to provide significant improvement in the key rate.
Here, we develop a simple and general treatment that can incorporate the effects of Gaussian trusted noises for any protocol that uses homodyne/heterodyne measurements.
In our method, a rescaling of the outcome of a noisy homodyne/heterodyne detector renders it equivalent to the outcome of a noiseless detector with a tiny additional loss.
arXiv Detail & Related papers (2023-05-28T10:38:36Z) - Robust Control for Dynamical Systems With Non-Gaussian Noise via Formal
Abstractions [59.605246463200736]
We present a novel controller synthesis method that does not rely on any explicit representation of the noise distributions.
First, we abstract the continuous control system into a finite-state model that captures noise by probabilistic transitions between discrete states.
We use state-of-the-art verification techniques to provide guarantees on the interval Markov decision process and compute a controller for which these guarantees carry over to the original control system.
arXiv Detail & Related papers (2023-01-04T10:40:30Z) - Suppressing Amplitude Damping in Trapped Ions: Discrete Weak
Measurements for a Non-unitary Probabilistic Noise Filter [62.997667081978825]
We introduce a low-overhead protocol to reverse this degradation.
We present two trapped-ion schemes for the implementation of a non-unitary probabilistic filter against amplitude damping noise.
This filter can be understood as a protocol for single-copy quasi-distillation.
arXiv Detail & Related papers (2022-09-06T18:18:41Z) - Data post-processing for the one-way heterodyne protocol under
composable finite-size security [62.997667081978825]
We study the performance of a practical continuous-variable (CV) quantum key distribution protocol.
We focus on the Gaussian-modulated coherent-state protocol with heterodyne detection in a high signal-to-noise ratio regime.
This allows us to study the performance for practical implementations of the protocol and optimize the parameters connected to the steps above.
arXiv Detail & Related papers (2022-05-20T12:37:09Z) - Sampling-Based Robust Control of Autonomous Systems with Non-Gaussian
Noise [59.47042225257565]
We present a novel planning method that does not rely on any explicit representation of the noise distributions.
First, we abstract the continuous system into a discrete-state model that captures noise by probabilistic transitions between states.
We capture these bounds in the transition probability intervals of a so-called interval Markov decision process (iMDP)
arXiv Detail & Related papers (2021-10-25T06:18:55Z) - Homodyne Detection Quadrature Phase Shift Keying Continuous-Variable
Quantum Key Distribution with High Excess Noise Tolerance [7.87972015113057]
We propose a homodyne detection protocol using the quadrature phase shift keying technique.
By limiting information leakage, our proposed protocol enhances excess noise tolerance to a high level.
Our results imply that the current protocol is able to distribute keys in nearly intercity area.
arXiv Detail & Related papers (2021-04-22T16:10:35Z) - Composably secure data processing for Gaussian-modulated continuous
variable quantum key distribution [58.720142291102135]
Continuous-variable quantum key distribution (QKD) employs the quadratures of a bosonic mode to establish a secret key between two remote parties.
We consider a protocol with homodyne detection in the general setting of composable finite-size security.
In particular, we analyze the high signal-to-noise regime which requires the use of high-rate (non-binary) low-density parity check codes.
arXiv Detail & Related papers (2021-03-30T18:02:55Z) - Improved DIQKD protocols with finite-size analysis [2.940150296806761]
We show that positive randomness is achievable up to depolarizing noise values of $9.33%$, exceeding all previously known noise thresholds.
We also develop a modification to random-key-measurement protocols, using a pre-shared seed followed by a "seed recovery" step.
arXiv Detail & Related papers (2020-12-16T03:04:19Z) - Efficient and robust certification of genuine multipartite entanglement
in noisy quantum error correction circuits [58.720142291102135]
We introduce a conditional witnessing technique to certify genuine multipartite entanglement (GME)
We prove that the detection of entanglement in a linear number of bipartitions by a number of measurements scales linearly, suffices to certify GME.
We apply our method to the noisy readout of stabilizer operators of the distance-three topological color code and its flag-based fault-tolerant version.
arXiv Detail & Related papers (2020-10-06T18:00:07Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.