Composably secure data processing for Gaussian-modulated continuous
variable quantum key distribution
- URL: http://arxiv.org/abs/2103.16589v3
- Date: Wed, 1 Dec 2021 09:14:07 GMT
- Title: Composably secure data processing for Gaussian-modulated continuous
variable quantum key distribution
- Authors: Alexander G. Mountogiannakis, Panagiotis Papanastasiou, Boris
Braverman, Stefano Pirandola
- Abstract summary: Continuous-variable quantum key distribution (QKD) employs the quadratures of a bosonic mode to establish a secret key between two remote parties.
We consider a protocol with homodyne detection in the general setting of composable finite-size security.
In particular, we analyze the high signal-to-noise regime which requires the use of high-rate (non-binary) low-density parity check codes.
- Score: 58.720142291102135
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Continuous-variable (CV) quantum key distribution (QKD) employs the
quadratures of a bosonic mode to establish a secret key between two remote
parties, and this is usually achieved via a Gaussian modulation of coherent
states. The resulting secret key rate depends not only on the loss and noise in
the communication channel, but also on a series of data processing steps that
are needed for transforming shared correlations into a final string of secret
bits. Here we consider a Gaussian-modulated coherent-state protocol with
homodyne detection in the general setting of composable finite-size security.
After simulating the process of quantum communication, the output classical
data is post-processed via procedures of parameter estimation, error
correction, and privacy amplification. In particular, we analyze the high
signal-to-noise regime which requires the use of high-rate (non-binary)
low-density parity check codes. We implement all these steps in a Python-based
library that allows one to investigate and optimize the protocol parameters to
be used in practical experimental implementations of short-range CV-QKD.
Related papers
- High-rate discretely-modulated continuous-variable quantum key
distribution using quantum machine learning [4.236937886028215]
We propose a high-rate scheme for discretely-modulated continuous-variable quantum key distribution (DM CVQKD) using quantum machine learning technologies.
A low-complexity quantum k-nearest neighbor (QkNN) is designed for predicting the lossy discretely-modulated coherent states (DMCSs) at Bob's side.
Numerical simulation shows that the secret key rate of our proposed scheme is explicitly superior to the existing DM CVQKD protocols.
arXiv Detail & Related papers (2023-08-07T04:00:13Z) - Quick Adaptive Ternary Segmentation: An Efficient Decoding Procedure For
Hidden Markov Models [70.26374282390401]
Decoding the original signal (i.e., hidden chain) from the noisy observations is one of the main goals in nearly all HMM based data analyses.
We present Quick Adaptive Ternary (QATS), a divide-and-conquer procedure which decodes the hidden sequence in polylogarithmic computational complexity.
arXiv Detail & Related papers (2023-05-29T19:37:48Z) - General treatment of Gaussian trusted noise in continuous variable
quantum key distribution [1.0499611180329804]
A trusted device scenario assumes that an adversary has no access to imperfections such as electronic noises in the detector is expected to provide significant improvement in the key rate.
Here, we develop a simple and general treatment that can incorporate the effects of Gaussian trusted noises for any protocol that uses homodyne/heterodyne measurements.
In our method, a rescaling of the outcome of a noisy homodyne/heterodyne detector renders it equivalent to the outcome of a noiseless detector with a tiny additional loss.
arXiv Detail & Related papers (2023-05-28T10:38:36Z) - Converging State Distributions for Discrete Modulated CVQKD Protocols [2.4366811507669124]
We show that the loss of secret key rate quickly falls below $10-5$ as the distance increases.
By using a 256-QAM with Gauss-Hermite shaping, the loss of secret key rate quickly falls below $10-5$ as the distance increases.
arXiv Detail & Related papers (2023-05-10T22:28:16Z) - Quantum key distribution rates from semidefinite programming [0.0]
We introduce an efficient algorithm for computing the key rate in quantum key distribution protocols.
The resulting algorithm is easy to implement and easy to use.
We use it to reanalyse experimental data to demonstrate how higher key rates can be achieved.
arXiv Detail & Related papers (2022-11-10T17:47:37Z) - Data post-processing for the one-way heterodyne protocol under
composable finite-size security [62.997667081978825]
We study the performance of a practical continuous-variable (CV) quantum key distribution protocol.
We focus on the Gaussian-modulated coherent-state protocol with heterodyne detection in a high signal-to-noise ratio regime.
This allows us to study the performance for practical implementations of the protocol and optimize the parameters connected to the steps above.
arXiv Detail & Related papers (2022-05-20T12:37:09Z) - Accurate methods for the analysis of strong-drive effects in parametric
gates [94.70553167084388]
We show how to efficiently extract gate parameters using exact numerics and a perturbative analytical approach.
We identify optimal regimes of operation for different types of gates including $i$SWAP, controlled-Z, and CNOT.
arXiv Detail & Related papers (2021-07-06T02:02:54Z) - Round-robin differential phase-time-shifting protocol for quantum key
distribution: theory and experiment [58.03659958248968]
Quantum key distribution (QKD) allows the establishment of common cryptographic keys among distant parties.
Recently, a QKD protocol that circumvents the need for monitoring signal disturbance, has been proposed and demonstrated in initial experiments.
We derive the security proofs of the round-robin differential phase-time-shifting protocol in the collective attack scenario.
Our results show that the RRDPTS protocol can achieve higher secret key rate in comparison with the RRDPS, in the condition of high quantum bit error rate.
arXiv Detail & Related papers (2021-03-15T15:20:09Z) - Gaussian conversion protocols for cubic phase state generation [104.23865519192793]
Universal quantum computing with continuous variables requires non-Gaussian resources.
The cubic phase state is a non-Gaussian state whose experimental implementation has so far remained elusive.
We introduce two protocols that allow for the conversion of a non-Gaussian state to a cubic phase state.
arXiv Detail & Related papers (2020-07-07T09:19:49Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.