Resource-efficient energy test and parameter estimation in
continuous-variable quantum key distribution
- URL: http://arxiv.org/abs/2103.15771v2
- Date: Mon, 12 Jul 2021 22:15:03 GMT
- Title: Resource-efficient energy test and parameter estimation in
continuous-variable quantum key distribution
- Authors: Cosmo Lupo
- Abstract summary: Symmetry plays a fundamental role in the security analysis of quantum key distribution (QKD)
We show how symmetry is exploited in continuous-variable (CV) QKD to prove the optimality of Gaussian attacks in the finite-size regime.
Results show that all the raw data can be used both for key extraction and for the routines of energy test and parameter estimation.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Symmetry plays a fundamental role in the security analysis of quantum key
distribution (QKD). Here we review how symmetry is exploited in
continuous-variable (CV) QKD to prove the optimality of Gaussian attacks in the
finite-size regime. We then apply these results to improve the efficiency, and
thus the key rate, of these protocols. First we show how to improve the
efficiency of the energy test, which is one important routine in a CV QKD
protocol aimed at establishing an upper bound on the effective dimensions of
the otherwise infinite-dimensional Hilbert space of CV systems. Second, we show
how the routine of parameter estimation can be made resource efficient in
measurement-device independent (MDI) QKD. These results show that all the raw
data can be used both for key extraction and for the routines of energy test
and parameter estimation.
Related papers
- Improved finite-size key rates for discrete-modulated continuous variable quantum key distribution under coherent attacks [0.0]
We consider a prepare-and-measure CVQKD protocol, where Alice chooses from a set of four coherent states and Bob performs a heterodyne measurement.
We provide a security proof against coherent attacks in the finite-size regime, and compute the achievable key rate.
arXiv Detail & Related papers (2024-07-03T13:18:31Z) - Optimising the relative entropy under semi definite constraints -- A new tool for estimating key rates in QKD [0.0]
Finding the minimal relative entropy of two quantum states under semi definite constraints is a pivotal problem.
We provide a method that addresses this optimisation.
We build on a recently introduced integral representation of quantum relative entropy by P.E. Frenkel.
arXiv Detail & Related papers (2024-04-25T20:19:47Z) - Harnessing high-dimensional temporal entanglement using limited interferometric setups [41.94295877935867]
We develop the first complete analysis of high-dimensional entanglement in the polarization-time-domain.
We show how to efficiently certify relevant density matrix elements and security parameters for Quantum Key Distribution.
We propose a novel setup that can further enhance the noise resistance of free-space quantum communication.
arXiv Detail & Related papers (2023-08-08T17:44:43Z) - Free Space Continuous Variable Quantum Key Distribution with Discrete
Phases [1.7891363899302908]
Continuous variable (CV) QKD offers many advantages over discrete variable (DV) QKD.
We demonstrate a discrete modulated CVQKD protocol in the free space which is robust against polarization drift.
arXiv Detail & Related papers (2023-05-22T15:25:54Z) - Robust and efficient verification of graph states in blind
measurement-based quantum computation [52.70359447203418]
Blind quantum computation (BQC) is a secure quantum computation method that protects the privacy of clients.
It is crucial to verify whether the resource graph states are accurately prepared in the adversarial scenario.
Here, we propose a robust and efficient protocol for verifying arbitrary graph states with any prime local dimension.
arXiv Detail & Related papers (2023-05-18T06:24:45Z) - Symmetric Pruning in Quantum Neural Networks [111.438286016951]
Quantum neural networks (QNNs) exert the power of modern quantum machines.
QNNs with handcraft symmetric ansatzes generally experience better trainability than those with asymmetric ansatzes.
We propose the effective quantum neural tangent kernel (EQNTK) to quantify the convergence of QNNs towards the global optima.
arXiv Detail & Related papers (2022-08-30T08:17:55Z) - Gradient-descent quantum process tomography by learning Kraus operators [63.69764116066747]
We perform quantum process tomography (QPT) for both discrete- and continuous-variable quantum systems.
We use a constrained gradient-descent (GD) approach on the so-called Stiefel manifold during optimization to obtain the Kraus operators.
The GD-QPT matches the performance of both compressed-sensing (CS) and projected least-squares (PLS) QPT in benchmarks with two-qubit random processes.
arXiv Detail & Related papers (2022-08-01T12:48:48Z) - Data post-processing for the one-way heterodyne protocol under
composable finite-size security [62.997667081978825]
We study the performance of a practical continuous-variable (CV) quantum key distribution protocol.
We focus on the Gaussian-modulated coherent-state protocol with heterodyne detection in a high signal-to-noise ratio regime.
This allows us to study the performance for practical implementations of the protocol and optimize the parameters connected to the steps above.
arXiv Detail & Related papers (2022-05-20T12:37:09Z) - Composably secure data processing for Gaussian-modulated continuous
variable quantum key distribution [58.720142291102135]
Continuous-variable quantum key distribution (QKD) employs the quadratures of a bosonic mode to establish a secret key between two remote parties.
We consider a protocol with homodyne detection in the general setting of composable finite-size security.
In particular, we analyze the high signal-to-noise regime which requires the use of high-rate (non-binary) low-density parity check codes.
arXiv Detail & Related papers (2021-03-30T18:02:55Z) - A model for optimizing quantum key distribution with continuous-wave
pumped entangled-photon sources [3.0178691659863452]
Quantum Key Distribution (QKD) allows unconditionally secure communication based on the laws of quantum mechanics.
We analyze the underlying mechanisms for QKD with temporally uniform pair-creation probabilities.
We develop a model to calculate optimal trade-offs for maximal secure key rates.
arXiv Detail & Related papers (2021-03-26T17:55:16Z) - Higher key rate of measurement-device-independent quantum key
distribution through joint data processing [0.8924669503280335]
We propose a method named as double-scanning method, to improve the key rate of measurement-device-independent quantum key distribution (MDI-QKD) drastically.
In the method, two parameters are scanned simultaneously to tightly estimate the counts of single-photon pairs and the phase-flip error rate jointly.
Numerical results show that the method in this work can improve the key rate by $35%-280%$ in a typical experimental set-up.
arXiv Detail & Related papers (2020-07-17T11:43:35Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.