Four-state reference-frame-independent quantum key distribution with
non-qubit sources
- URL: http://arxiv.org/abs/2103.11202v2
- Date: Mon, 24 May 2021 08:49:18 GMT
- Title: Four-state reference-frame-independent quantum key distribution with
non-qubit sources
- Authors: Zhenhua Li, Tianqi Dou, Jipeng Wang, Zhongqi Sun, Fen Zhou, Yanxin
Han, Yuqing Huang, Hongwei Liu and Haiqiang Ma
- Abstract summary: We analyze the security of the RFI-QKD protocol with non-qubit sources based on generalizing loss-tolerant techniques.
Our work can effectively defend against non-qubit sources including a misaligned reference frame, state preparation flaws, multiple optical modes, and Trojan horse attacks.
- Score: 8.362172668103643
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: The discrepancy between theory and experiment severely limits the development
of quantum key distribution (QKD). Reference-frame-independent (RFI) protocol
has been proposed to avoid alignment of the reference frame. However, multiple
optical modes caused by Trojan horse attacks and equipment loopholes lead to
the imperfect emitted signal unavoidably. In this paper, we analyzed the
security of the RFI-QKD protocol with non-qubit sources based on generalizing
loss-tolerant techniques. The simulation results show that our work can
effectively defend against non-qubit sources including a misaligned reference
frame, state preparation flaws, multiple optical modes, and Trojan horse
attacks. Moreover, it only requires the preparation of four quantum states,
which reduces the complexity of the experiment in the future.
Related papers
- Performance Analysis of One- and Two-way DV-QKD with MIMO FSO Communication Systems [33.44770581515422]
Two legitimate users attempt to exchange secret keys over free-space optical channels.<n>Novel frameworks for the use of the one- and two-way discrete-variable quantum key distribution protocols are presented.
arXiv Detail & Related papers (2025-11-07T11:42:25Z) - Quantum dialogue through non-destructive discrimination of cluster state [0.6749750044497732]
We propose a quantum dialogue protocol that uses the non-destructive discrimination (NDD) of five qubit cluster states.<n>The proposed protocol is a measurement-based protocol, where ancilla qubits are used to perform measurement on the state without destroying its entanglement.
arXiv Detail & Related papers (2025-06-05T10:16:09Z) - Decoherence-assisted quantum key distribution [37.69303106863453]
We show that our method reduces the amount of information that an eavesdropper can obtain in the BB84 protocol under the entangling probe attack.
We demonstrate experimentally that Alice and Bob can agree on a scheme to that gives low values of the quantum bit error rate.
arXiv Detail & Related papers (2024-05-30T15:28:07Z) - Prototype-based Aleatoric Uncertainty Quantification for Cross-modal
Retrieval [139.21955930418815]
Cross-modal Retrieval methods build similarity relations between vision and language modalities by jointly learning a common representation space.
However, the predictions are often unreliable due to the Aleatoric uncertainty, which is induced by low-quality data, e.g., corrupt images, fast-paced videos, and non-detailed texts.
We propose a novel Prototype-based Aleatoric Uncertainty Quantification (PAU) framework to provide trustworthy predictions by quantifying the uncertainty arisen from the inherent data ambiguity.
arXiv Detail & Related papers (2023-09-29T09:41:19Z) - Semi-device independent nonlocality certification for near-term quantum
networks [46.37108901286964]
Bell tests are the most rigorous method for verifying entanglement in quantum networks.
If there is any signaling between the parties, then the violation of Bell inequalities can no longer be used.
We propose a semi-device independent protocol that allows us to numerically correct for effects of correlations in experimental probability distributions.
arXiv Detail & Related papers (2023-05-23T14:39:08Z) - Reliable Quantum Communications based on Asymmetry in Distillation and Coding [35.693513369212646]
We address the problem of reliable provision of entangled qubits in quantum computing schemes.
We combine indirect transmission based on teleportation and distillation; (2) direct transmission, based on quantum error correction (QEC)
Our results show that ad-hoc asymmetric codes give, compared to conventional QEC, a performance boost and codeword size reduction both in a single link and in a quantum network scenario.
arXiv Detail & Related papers (2023-05-01T17:13:23Z) - Phase-Matching Quantum Key Distribution without Intensity Modulation [25.004151934190965]
We propose a phase-matching quantum key distribution protocol without intensity modulation.
Simulation results show that the transmission distance of our protocol could reach 305 km in telecommunication fiber.
Our protocol provides a promising solution for constructing quantum networks.
arXiv Detail & Related papers (2023-03-21T04:32:01Z) - The Quantum Chernoff Divergence in Advantage Distillation for QKD and
DIQKD [0.0]
Device-independent quantum key distribution (DIQKD) aims to mitigate adversarial exploitation of imperfections in quantum devices.
We present an alternative proof structure that replaces the fidelity with the quantum Chernoff divergence.
Our results provide insight into a fundamental question in quantum information theory regarding the circumstances under which DIQKD is possible.
arXiv Detail & Related papers (2022-12-14T01:44:23Z) - Modified BB84 quantum key distribution protocol robust to source
imperfections [1.53934570513443]
Bennett-Brassard 1984 (BB84) protocol is the most widely implemented quantum key distribution scheme.
We prove the security of the BB84 protocol in the presence of multiple source imperfections.
We show that the addition of a fourth state, while redundant in ideal conditions, significantly improves the estimation of the leaked information.
arXiv Detail & Related papers (2022-10-21T06:23:01Z) - Experimental measurement-device-independent type quantum key
distribution with flawed and correlated sources [14.143874849657317]
Security of quantum key distribution (QKD) is threatened by discrepancies between realistic devices and theoretical assumptions.
Here, we adopt the reference technique to prove security of an efficient four-phase measurement-device-independent QKD using laser pulses against potential source imperfections.
In addition, we demonstrate the feasibility of our protocol through a proof-of-principle experimental implementation and achieve a secure key rate of 253 bps with a 20 dB channel loss.
arXiv Detail & Related papers (2022-04-18T13:44:51Z) - Fault-tolerant parity readout on a shuttling-based trapped-ion quantum
computer [64.47265213752996]
We experimentally demonstrate a fault-tolerant weight-4 parity check measurement scheme.
We achieve a flag-conditioned parity measurement single-shot fidelity of 93.2(2)%.
The scheme is an essential building block in a broad class of stabilizer quantum error correction protocols.
arXiv Detail & Related papers (2021-07-13T20:08:04Z) - Security of round-robin differential-phase-shift quantum key
distribution protocol with correlated light sources [2.538209532048867]
We prove that the RRDPS protocol is secure against any source imperfections by establishing a proof with the pulse correlations.
Our numerical simulation based on the proof shows that the long-range pulse correlation does not cause a significant impact on the key rate.
arXiv Detail & Related papers (2021-07-06T13:08:36Z) - Round-robin differential phase-time-shifting protocol for quantum key
distribution: theory and experiment [58.03659958248968]
Quantum key distribution (QKD) allows the establishment of common cryptographic keys among distant parties.
Recently, a QKD protocol that circumvents the need for monitoring signal disturbance, has been proposed and demonstrated in initial experiments.
We derive the security proofs of the round-robin differential phase-time-shifting protocol in the collective attack scenario.
Our results show that the RRDPTS protocol can achieve higher secret key rate in comparison with the RRDPS, in the condition of high quantum bit error rate.
arXiv Detail & Related papers (2021-03-15T15:20:09Z) - Practical Quantum Key Distribution Secure Against Side-Channels [0.0]
We introduce a measurement-device-independent (MDI) QKD type of protocol based on the transmission of coherent light.
We prove its security against any possible device imperfection and/or side-channel at the transmitters' side.
The performance of the protocol is comparable to other MDI-QKD type of protocols which disregard the effect of several side-channels.
arXiv Detail & Related papers (2020-07-07T11:56:04Z) - Using Quantum Metrological Bounds in Quantum Error Correction: A Simple
Proof of the Approximate Eastin-Knill Theorem [77.34726150561087]
We present a proof of the approximate Eastin-Knill theorem, which connects the quality of a quantum error-correcting code with its ability to achieve a universal set of logical gates.
Our derivation employs powerful bounds on the quantum Fisher information in generic quantum metrological protocols.
arXiv Detail & Related papers (2020-04-24T17:58:10Z) - Efficient decoy-states for the reference-frame-independent
measurement-device-independent quantum key distribution [22.452971995801686]
RFI-MDI-QKD eliminates all possible attacks on detector side and necessity of reference-frame alignment in source sides.
The performance of RFI-MDI-QKD is greatly improved in terms of secret key rate and achievable distance when statistical fluctuations are considered.
arXiv Detail & Related papers (2020-02-10T11:52:53Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.