Improved DIQKD protocols with finite-size analysis
- URL: http://arxiv.org/abs/2012.08714v5
- Date: Mon, 24 Jul 2023 00:08:08 GMT
- Title: Improved DIQKD protocols with finite-size analysis
- Authors: Ernest Y.-Z. Tan, Pavel Sekatski, Jean-Daniel Bancal, Ren\'e
Schwonnek, Renato Renner, Nicolas Sangouard, Charles C.-W. Lim
- Abstract summary: We show that positive randomness is achievable up to depolarizing noise values of $9.33%$, exceeding all previously known noise thresholds.
We also develop a modification to random-key-measurement protocols, using a pre-shared seed followed by a "seed recovery" step.
- Score: 2.940150296806761
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: The security of finite-length keys is essential for the implementation of
device-independent quantum key distribution (DIQKD). Presently, there are
several finite-size DIQKD security proofs, but they are mostly focused on
standard DIQKD protocols and do not directly apply to the recent improved DIQKD
protocols based on noisy preprocessing, random key measurements, and modified
CHSH inequalities. Here, we provide a general finite-size security proof that
can simultaneously encompass these approaches, using tighter finite-size bounds
than previous analyses. In doing so, we develop a method to compute tight lower
bounds on the asymptotic keyrate for any such DIQKD protocol with binary inputs
and outputs. With this, we show that positive asymptotic keyrates are
achievable up to depolarizing noise values of $9.33\%$, exceeding all
previously known noise thresholds. We also develop a modification to
random-key-measurement protocols, using a pre-shared seed followed by a "seed
recovery" step, which yields substantially higher net key generation rates by
essentially removing the sifting factor. Some of our results may also improve
the keyrates of device-independent randomness expansion.
Related papers
- Improved finite-size key rates for discrete-modulated continuous variable quantum key distribution under coherent attacks [0.0]
We consider a prepare-and-measure CVQKD protocol, where Alice chooses from a set of four coherent states and Bob performs a heterodyne measurement.
We provide a security proof against coherent attacks in the finite-size regime, and compute the achievable key rate.
arXiv Detail & Related papers (2024-07-03T13:18:31Z) - Phase-Matching Quantum Key Distribution without Intensity Modulation [25.004151934190965]
We propose a phase-matching quantum key distribution protocol without intensity modulation.
Simulation results show that the transmission distance of our protocol could reach 305 km in telecommunication fiber.
Our protocol provides a promising solution for constructing quantum networks.
arXiv Detail & Related papers (2023-03-21T04:32:01Z) - Refined finite-size analysis of binary-modulation continuous-variable
quantum key distribution [0.562479170374811]
We extend the security proof based on complementarity, which is used in the discrete-variable QKD, to the previously developed binary-modulation CV-QKD protocols.
Notably, the key rate in the limit scales linearly against the attenuation rate, which is known to be optimal scaling but is not achieved in previous finite-size analyses.
arXiv Detail & Related papers (2023-01-09T05:11:23Z) - Upper bounds on key rates in device-independent quantum key distribution
based on convex-combination attacks [1.118478900782898]
We present the convex-combination attack as an efficient, easy-to-use technique for upper-bounding DIQKD key rates.
It allows verifying the accuracy of lower bounds on key rates for state-of-the-art protocols.
arXiv Detail & Related papers (2022-06-13T15:27:48Z) - Data post-processing for the one-way heterodyne protocol under
composable finite-size security [62.997667081978825]
We study the performance of a practical continuous-variable (CV) quantum key distribution protocol.
We focus on the Gaussian-modulated coherent-state protocol with heterodyne detection in a high signal-to-noise ratio regime.
This allows us to study the performance for practical implementations of the protocol and optimize the parameters connected to the steps above.
arXiv Detail & Related papers (2022-05-20T12:37:09Z) - Numerical Method for Finite-size Security Analysis of Quantum Key
Distribution [1.2891210250935146]
We develop a finite-size security analysis against general attacks for general QKD protocols.
Our result shows that the finite-size key rate can surpass the linear key-rate bound in a realistic communication time.
arXiv Detail & Related papers (2021-11-16T09:10:56Z) - Composably secure data processing for Gaussian-modulated continuous
variable quantum key distribution [58.720142291102135]
Continuous-variable quantum key distribution (QKD) employs the quadratures of a bosonic mode to establish a secret key between two remote parties.
We consider a protocol with homodyne detection in the general setting of composable finite-size security.
In particular, we analyze the high signal-to-noise regime which requires the use of high-rate (non-binary) low-density parity check codes.
arXiv Detail & Related papers (2021-03-30T18:02:55Z) - Round-robin differential phase-time-shifting protocol for quantum key
distribution: theory and experiment [58.03659958248968]
Quantum key distribution (QKD) allows the establishment of common cryptographic keys among distant parties.
Recently, a QKD protocol that circumvents the need for monitoring signal disturbance, has been proposed and demonstrated in initial experiments.
We derive the security proofs of the round-robin differential phase-time-shifting protocol in the collective attack scenario.
Our results show that the RRDPTS protocol can achieve higher secret key rate in comparison with the RRDPS, in the condition of high quantum bit error rate.
arXiv Detail & Related papers (2021-03-15T15:20:09Z) - Twin-field quantum key distribution with passive-decoy state [22.26373392802507]
We propose passive-decoy based TF-QKD, in which we combine TF-QKD with the passive-decoy method.
We present a simulation comparing the key generation rate with that in active-decoy, the result shows our scheme performs as good as active decoy TF-QKD.
arXiv Detail & Related papers (2020-11-15T04:02:48Z) - Finite-key analysis for twin-field quantum key distribution based on
generalized operator dominance condition [23.004519226886444]
Quantum key distribution (QKD) can help two distant peers to share secret key bits, whose security is guaranteed by the law of physics.
Recently, twin-field (TF) QKD has been proposed and intensively studied, since it can beat the rate-distance limit.
We propose an improved finite-key analysis of TF-QKD through new operator dominance condition.
arXiv Detail & Related papers (2020-07-17T09:41:06Z) - Device-Independent Quantum Key Distribution with Random Key Basis [0.0]
Device-independent quantum key distribution (DIQKD) is the art of using untrusted devices to distribute secret keys in an insecure network.
We show that our protocol significantly improves over the original DIQKD protocol, enabling positive keys in the high noise regime for the first time.
arXiv Detail & Related papers (2020-05-06T09:57:47Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.