Optimizing the Decoy-State BB84 QKD Protocol Parameters
- URL: http://arxiv.org/abs/2006.15962v2
- Date: Mon, 28 Dec 2020 08:37:21 GMT
- Title: Optimizing the Decoy-State BB84 QKD Protocol Parameters
- Authors: Thomas Attema, Joost Bosman, Niels Neumann
- Abstract summary: The performance of a QKD implementation is determined by the tightness of the underlying security analysis.
It is known that optimal protocol parameters, such as the number of decoy states and their intensities, can be found by solving a nonlinear optimization problem.
We show an improved performance for the Decoy-State BB84 QKD protocol, demonstrating that the assumptions typically made are too restrictive.
- Score: 3.6954802719347413
- License: http://creativecommons.org/licenses/by-nc-sa/4.0/
- Abstract: The performance of a QKD implementation is determined by the tightness of the
underlying security analysis. In particular, the security analyses determines
the key-rate, i.e., the amount of cryptographic key material that can be
distributed per time unit. Nowadays, the security analyses of various QKD
protocols are well understood. It is known that optimal protocol parameters,
such as the number of decoy states and their intensities, can be found by
solving a nonlinear optimization problem. The complexity of this optimization
problem is typically handled by making an number of heuristic assumptions. For
instance, the number of decoy states is restricted to only one or two, with one
of the decoy intensities set to a fixed value, and vacuum states are ignored as
they are assumed to contribute only marginally to the secure key-rate. These
assumptions simplify the optimization problem and reduce the size of search
space significantly. However, they also cause the security analysis to be
non-tight, and thereby result in sub-optimal performance.
In this work, we follow a more rigorous approach using both linear and
non-linear programs describing the optimization problem. Our approach, focusing
on the Decoy-State BB84 protocol, allows heuristic assumptions to be omitted,
and therefore results in a tighter security analysis with better protocol
parameters. We show an improved performance for the Decoy-State BB84 QKD
protocol, demonstrating that the heuristic assumptions typically made are too
restrictive. Moreover, our improved optimization frameworks shows that the
complexity of the performance optimization problem can also be handled without
making heuristic assumptions, even with limited computational resources
available.
Related papers
- Finite-size analysis of prepare-and-measure and decoy-state QKD via entropy accumulation [0.8246494848934447]
We present techniques for applying the generalized entropy accumulation theorem (GEAT) in finite-size analysis of generic prepare-and-measure protocols.
We develop methods to incorporate some improvements to the finite-size terms in the proofs GEAT, and implement techniques to automatically optimize the min-tradeoff function.
arXiv Detail & Related papers (2024-06-14T17:31:45Z) - A Learning-Based Optimal Uncertainty Quantification Method and Its
Application to Ballistic Impact Problems [1.713291434132985]
This paper concerns the optimal (supremum and infimum) uncertainty bounds for systems where the input (or prior) measure is only partially/imperfectly known.
We demonstrate the learning based framework on the uncertainty optimization problem.
We show that the approach can be used to construct maps for the performance certificate and safety in engineering practice.
arXiv Detail & Related papers (2022-12-28T14:30:53Z) - Log Barriers for Safe Black-box Optimization with Application to Safe
Reinforcement Learning [72.97229770329214]
We introduce a general approach for seeking high dimensional non-linear optimization problems in which maintaining safety during learning is crucial.
Our approach called LBSGD is based on applying a logarithmic barrier approximation with a carefully chosen step size.
We demonstrate the effectiveness of our approach on minimizing violation in policy tasks in safe reinforcement learning.
arXiv Detail & Related papers (2022-07-21T11:14:47Z) - Evolutionary Optimization of High-Coverage Budgeted Classifiers [1.7767466724342065]
Budgeted multi-feature classifiers (MSC) process inputs through a sequence of partial feature acquisition and evaluation steps.
This paper proposes a problem-specific MSC that incorporates a terminal reject option for indecisive predictions.
The algorithm's design emphasizes efficiency while respecting a notion of aggregated performance via a uniqueization.
arXiv Detail & Related papers (2021-10-25T16:03:07Z) - Outlier-Robust Sparse Estimation via Non-Convex Optimization [73.18654719887205]
We explore the connection between high-dimensional statistics and non-robust optimization in the presence of sparsity constraints.
We develop novel and simple optimization formulations for these problems.
As a corollary, we obtain that any first-order method that efficiently converges to station yields an efficient algorithm for these tasks.
arXiv Detail & Related papers (2021-09-23T17:38:24Z) - Security analysis method for practical quantum key distribution with
arbitrary encoding schemes [7.321809883860193]
We propose a security analysis method without restriction on encoding schemes.
We illustrate its ability by analyzing source flaws and a high-dimensional asymmetric protocol.
Our work has the potential to become a reference standard for the security analysis of practical QKD.
arXiv Detail & Related papers (2021-09-10T09:53:33Z) - A general sample complexity analysis of vanilla policy gradient [101.16957584135767]
Policy gradient (PG) is one of the most popular reinforcement learning (RL) problems.
"vanilla" theoretical understanding of PG trajectory is one of the most popular methods for solving RL problems.
arXiv Detail & Related papers (2021-07-23T19:38:17Z) - Improved DIQKD protocols with finite-size analysis [2.940150296806761]
We show that positive randomness is achievable up to depolarizing noise values of $9.33%$, exceeding all previously known noise thresholds.
We also develop a modification to random-key-measurement protocols, using a pre-shared seed followed by a "seed recovery" step.
arXiv Detail & Related papers (2020-12-16T03:04:19Z) - Global Optimization of Objective Functions Represented by ReLU Networks [77.55969359556032]
Neural networks can learn complex, non- adversarial functions, and it is challenging to guarantee their correct behavior in safety-critical contexts.
Many approaches exist to find failures in networks (e.g., adversarial examples), but these cannot guarantee the absence of failures.
We propose an approach that integrates the optimization process into the verification procedure, achieving better performance than the naive approach.
arXiv Detail & Related papers (2020-10-07T08:19:48Z) - Adaptive Sampling for Best Policy Identification in Markov Decision
Processes [79.4957965474334]
We investigate the problem of best-policy identification in discounted Markov Decision (MDPs) when the learner has access to a generative model.
The advantages of state-of-the-art algorithms are discussed and illustrated.
arXiv Detail & Related papers (2020-09-28T15:22:24Z) - Second-Order Guarantees in Centralized, Federated and Decentralized
Nonconvex Optimization [64.26238893241322]
Simple algorithms have been shown to lead to good empirical results in many contexts.
Several works have pursued rigorous analytical justification for studying non optimization problems.
A key insight in these analyses is that perturbations play a critical role in allowing local descent algorithms.
arXiv Detail & Related papers (2020-03-31T16:54:22Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.