A model for optimizing quantum key distribution with continuous-wave
pumped entangled-photon sources
- URL: http://arxiv.org/abs/2103.14639v3
- Date: Thu, 22 Jul 2021 08:59:52 GMT
- Title: A model for optimizing quantum key distribution with continuous-wave
pumped entangled-photon sources
- Authors: Sebastian Philipp Neumann, Thomas Scheidl, Mirela Selimovic, Matej
Pivoluska, Bo Liu, Martin Bohmann and Rupert Ursin
- Abstract summary: Quantum Key Distribution (QKD) allows unconditionally secure communication based on the laws of quantum mechanics.
We analyze the underlying mechanisms for QKD with temporally uniform pair-creation probabilities.
We develop a model to calculate optimal trade-offs for maximal secure key rates.
- Score: 3.0178691659863452
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Quantum Key Distribution (QKD) allows unconditionally secure communication
based on the laws of quantum mechanics rather then assumptions about
computational hardness. Optimizing the operation parameters of a given QKD
implementation is indispensable in order to achieve high secure key rates. So
far, there exists no model that accurately describes entanglement-based QKD
with continuous-wave pump lasers. For the first time, we analyze the underlying
mechanisms for QKD with temporally uniform pair-creation probabilities and
develop a simple but accurate model to calculate optimal trade-offs for maximal
secure key rates. In particular, we find an optimization strategy of the source
brightness for given losses and detection-time resolution. All experimental
parameters utilized by the model can be inferred directly in standard QKD
implementations, and no additional assessment of device performance is
required. Comparison with experimental data shows the validity of our model.
Our results yield a tool to determine optimal operation parameters for already
existing QKD systems, to plan a full QKD implementation from scratch, and to
determine fundamental key rate and distance limits of given connections.
Related papers
- Performance of Cascade and LDPC-codes for Information Reconciliation on Industrial Quantum Key Distribution Systems [69.47813697920358]
We analyze, simulate, optimize, and compare the performance of two prevalent algorithms used for Information Reconciliation.
We focus on their applicability in practical and industrial settings, operating in realistic and application-close conditions.
arXiv Detail & Related papers (2024-08-28T12:51:03Z) - Precise Phase Error Rate Analysis for Quantum Key Distribution with
Phase Postselection [14.638851224694692]
Quantum key distribution (QKD) stands as a pioneering method for establishing information-theoretically secure communication channels.
Here we make a precise phase error rate analysis for QKD protocols with phase postselection.
We further apply our analysis in sending-or-not-sending twin-field quantum key distribution (SNS-TFQKD) and mode-pairing quantum key distribution (MP-QKD)
arXiv Detail & Related papers (2023-12-11T13:49:40Z) - Boosting quantum key distribution via the end-to-end loss control [0.0]
We show a remarkable improvement in the quantum key distribution (QKD) performance using end-to-end line tomography.
Our approach is based on the real-time detection of interventions in the transmission channel.
Our findings provide everlastingly secure efficient quantum cryptography deployment.
arXiv Detail & Related papers (2023-08-07T17:32:14Z) - Finite-key security of passive quantum key distribution [0.0]
The passive approach to quantum key distribution (QKD) consists of eliminating all optical modulators and random number generators from QKD systems.
We provide finite-key security bounds for a fully passive decoy-state BB84 protocol.
arXiv Detail & Related papers (2023-08-04T15:18:25Z) - Robust and efficient verification of graph states in blind
measurement-based quantum computation [52.70359447203418]
Blind quantum computation (BQC) is a secure quantum computation method that protects the privacy of clients.
It is crucial to verify whether the resource graph states are accurately prepared in the adversarial scenario.
Here, we propose a robust and efficient protocol for verifying arbitrary graph states with any prime local dimension.
arXiv Detail & Related papers (2023-05-18T06:24:45Z) - Experimental study of secure quantum key distribution with source and
detection imperfections [4.193177700786187]
The quantum key distribution (QKD) is a promising solution for future secure information and communication technology.
This study reports a decoy-state BB84 QKD experiment that considers both source and detection imperfections.
arXiv Detail & Related papers (2022-08-08T03:31:20Z) - QSAN: A Near-term Achievable Quantum Self-Attention Network [73.15524926159702]
Self-Attention Mechanism (SAM) is good at capturing the internal connections of features.
A novel Quantum Self-Attention Network (QSAN) is proposed for image classification tasks on near-term quantum devices.
arXiv Detail & Related papers (2022-07-14T12:22:51Z) - Data post-processing for the one-way heterodyne protocol under
composable finite-size security [62.997667081978825]
We study the performance of a practical continuous-variable (CV) quantum key distribution protocol.
We focus on the Gaussian-modulated coherent-state protocol with heterodyne detection in a high signal-to-noise ratio regime.
This allows us to study the performance for practical implementations of the protocol and optimize the parameters connected to the steps above.
arXiv Detail & Related papers (2022-05-20T12:37:09Z) - Composably secure data processing for Gaussian-modulated continuous
variable quantum key distribution [58.720142291102135]
Continuous-variable quantum key distribution (QKD) employs the quadratures of a bosonic mode to establish a secret key between two remote parties.
We consider a protocol with homodyne detection in the general setting of composable finite-size security.
In particular, we analyze the high signal-to-noise regime which requires the use of high-rate (non-binary) low-density parity check codes.
arXiv Detail & Related papers (2021-03-30T18:02:55Z) - Resource-efficient energy test and parameter estimation in
continuous-variable quantum key distribution [0.0]
Symmetry plays a fundamental role in the security analysis of quantum key distribution (QKD)
We show how symmetry is exploited in continuous-variable (CV) QKD to prove the optimality of Gaussian attacks in the finite-size regime.
Results show that all the raw data can be used both for key extraction and for the routines of energy test and parameter estimation.
arXiv Detail & Related papers (2021-03-29T17:04:10Z) - APQ: Joint Search for Network Architecture, Pruning and Quantization
Policy [49.3037538647714]
We present APQ for efficient deep learning inference on resource-constrained hardware.
Unlike previous methods that separately search the neural architecture, pruning policy, and quantization policy, we optimize them in a joint manner.
With the same accuracy, APQ reduces the latency/energy by 2x/1.3x over MobileNetV2+HAQ.
arXiv Detail & Related papers (2020-06-15T16:09:17Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.