Quantum Conference Key Agreement with Photon Loss
- URL: http://arxiv.org/abs/2101.01483v2
- Date: Tue, 12 Jan 2021 15:27:41 GMT
- Title: Quantum Conference Key Agreement with Photon Loss
- Authors: Phattharaporn Singkanipa and Pieter Kok
- Abstract summary: Conference key agreement (CKA) is an information processing task where more than two parties want to share a common secret key.
We present a loss-resilient protocol for CKA, based on redundant encoding and error correction.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Conference key agreement (CKA) is an information processing task where more
than two parties want to share a common secret key. Here, we present a
loss-resilient protocol for CKA, based on redundant encoding and error
correction. Our protocol provides a speed-up in transmission rate over the
existing lossy CKA protocol. However, encoding and error correction come with
extra cost. We show that, using photon sources with creation probability p >
0.3, our protocol's secret key rate can overcome the existing protocol's.
Hence, high probability entangled photon sources are required for realistic
implementation of our loss-resilient protocol.
Related papers
- Making Existing Quantum Position Verification Protocols Secure Against
Arbitrary Transmission Loss [0.889974344676093]
In quantum position verification (QPV) protocols, even relatively small loss rates can compromise security.
We modify the usual structure of QPV protocols and prove that this modification makes the potentially high transmission loss between the verifiers security-irrelevant.
We show possible implementations of the required photon presence detection, making c-$mathrmQPV_mathrmBB84f$ a protocol that solves all major practical issues in QPV.
arXiv Detail & Related papers (2023-12-19T21:38:10Z) - Practical quantum secure direct communication with squeezed states [55.41644538483948]
We report the first table-top experimental demonstration of a CV-QSDC system and assess its security.
This realization paves the way into future threat-less quantum metropolitan networks, compatible with coexisting advanced wavelength division multiplexing (WDM) systems.
arXiv Detail & Related papers (2023-06-25T19:23:42Z) - High-dimensional Encoding in the Round-Robin Differential-Phase-Shift
Protocol [0.0]
We propose an approach to extend the RRDPS QKD protocol to an arbitrarily large encoding alphabet.
Our approach offers insight into bridging the gap between seemingly incompatible quantum communication schemes.
arXiv Detail & Related papers (2023-02-15T19:00:01Z) - New protocols for quantum key distribution with explicit upper and lower
bound on secret-key rate [0.0]
We present two new schemes for quantum key distribution (QKD) which neither require entanglement nor require an ideal single photon source.
The proposed protocols can be implemented using realistic single photon sources which are commercially available.
arXiv Detail & Related papers (2022-12-26T11:14:39Z) - Single-photon-memory measurement-device-independent quantum secure
direct communication [63.75763893884079]
Quantum secure direct communication (QSDC) uses the quantum channel to transmit information reliably and securely.
In order to eliminate the security loopholes resulting from practical detectors, the measurement-device-independent (MDI) QSDC protocol has been proposed.
We propose a single-photon-memory MDI QSDC protocol (SPMQC) for dispensing with high-performance quantum memory.
arXiv Detail & Related papers (2022-12-12T02:23:57Z) - Conference key agreement in a quantum network [67.410870290301]
Quantum conference key agreement (QCKA) allows multiple users to establish a secure key from a shared multi-partite entangled state.
In a quantum network, this protocol can be efficiently implemented using a single copy of a N-qubit Greenberger-Horne-Zeilinger (GHZ) state to distil a secure N-user conference key bit.
arXiv Detail & Related papers (2022-07-04T18:00:07Z) - Byzantine-Robust Federated Learning with Optimal Statistical Rates and
Privacy Guarantees [123.0401978870009]
We propose Byzantine-robust federated learning protocols with nearly optimal statistical rates.
We benchmark against competing protocols and show the empirical superiority of the proposed protocols.
Our protocols with bucketing can be naturally combined with privacy-guaranteeing procedures to introduce security against a semi-honest server.
arXiv Detail & Related papers (2022-05-24T04:03:07Z) - Data post-processing for the one-way heterodyne protocol under
composable finite-size security [62.997667081978825]
We study the performance of a practical continuous-variable (CV) quantum key distribution protocol.
We focus on the Gaussian-modulated coherent-state protocol with heterodyne detection in a high signal-to-noise ratio regime.
This allows us to study the performance for practical implementations of the protocol and optimize the parameters connected to the steps above.
arXiv Detail & Related papers (2022-05-20T12:37:09Z) - Scalable High-Rate Twin-Field Quantum Key Distribution Networks without
Constraint of Probability and Intensity [9.67767681743488]
We propose a two-photon twin-field quantum key distribution protocol.
We exploit the non-interference mode as the code mode to highly tolerate interference errors.
Our protocol can transcend the limitations while breaking the secret key capacity of repeaterless quantum key distribution.
arXiv Detail & Related papers (2021-12-21T13:00:28Z) - Coherent one-way quantum conference key agreement based on twin field [9.369069713000165]
Quantum conference key agreement (CKA) enables key sharing among trusted users with information-theoretic security.
We propose a quantum CKA protocol of three users.
Exploiting coherent states with intensity 0 and $mu$ to encode logic bits, our protocol can break the limit.
arXiv Detail & Related papers (2021-09-06T03:53:08Z) - Round-robin differential phase-time-shifting protocol for quantum key
distribution: theory and experiment [58.03659958248968]
Quantum key distribution (QKD) allows the establishment of common cryptographic keys among distant parties.
Recently, a QKD protocol that circumvents the need for monitoring signal disturbance, has been proposed and demonstrated in initial experiments.
We derive the security proofs of the round-robin differential phase-time-shifting protocol in the collective attack scenario.
Our results show that the RRDPTS protocol can achieve higher secret key rate in comparison with the RRDPS, in the condition of high quantum bit error rate.
arXiv Detail & Related papers (2021-03-15T15:20:09Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.