Optimizing Continuous-Variable Quantum Key Distribution with Phase-Shift
Keying Modulation and Postselection
- URL: http://arxiv.org/abs/2104.09454v5
- Date: Mon, 17 Oct 2022 13:50:31 GMT
- Title: Optimizing Continuous-Variable Quantum Key Distribution with Phase-Shift
Keying Modulation and Postselection
- Authors: Florian Kanitschar and Christoph Pacher
- Abstract summary: A numerical security proof technique is used to analyse the security of continuous-variable quantum key distribution (CV-QKD) protocols.
We show that postselection can be used to reduce the key rate gap between scenarios with trusted and untrusted detectors.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: A numerical security proof technique is used to analyse the security of
continuous-variable quantum key distribution (CV-QKD) protocols with
phase-shift keying modulation against collective attacks in the asymptotic
limit. We argue why it is sufficient to consider protocols with a maximum
number of eight signal states and analyse different postselection strategies
for protocols with four (QPSK) and eight (8PSK) signal states for untrusted
ideal and trusted nonideal detectors. We introduce a \emph{cross-shaped}
postselection strategy, and show that both cross-shaped and radial and angular
postselection clearly outperform a radial postselection scheme (and no
postselection) for QPSK protocols. For all strategies studied, we provide
analytical results for the operators defining the respective regions in phase
space. We outline several use-cases of postselection, which can easily be
introduced in the data processing of both new and existing CV-QKD systems:
Motivated by the high computational effort for error-correction, we studied the
case when a large fraction of the raw key is eliminated by postselection and
observed that this can be achieved while increasing the secure key rate.
Postselection can also be used to partially compensate the disadvantage of QPSK
protocols over 8PSK protocols for high transmission distances, while being
experimentally less demanding. Finally, we highlight that postselection can be
used to reduce the key rate gap between scenarios with trusted and untrusted
detectors while relying on less assumptions on Eve's power.
Related papers
- Improved finite-size effects in QKD protocols with applications to decoy-state QKD [0.0]
We present a finite-size security proof for generic quantum key distribution protocols against independent and identically distributed collective attacks.
We extend our proof to coherent attacks and variable-length protocols.
arXiv Detail & Related papers (2025-02-07T23:37:50Z) - Practical hybrid PQC-QKD protocols with enhanced security and performance [44.8840598334124]
We develop hybrid protocols by which QKD and PQC inter-operate within a joint quantum-classical network.
In particular, we consider different hybrid designs that may offer enhanced speed and/or security over the individual performance of either approach.
arXiv Detail & Related papers (2024-11-02T00:02:01Z) - Practical quantum secure direct communication with squeezed states [55.41644538483948]
We report the first table-top experimental demonstration of a CV-QSDC system and assess its security.
This realization paves the way into future threat-less quantum metropolitan networks, compatible with coexisting advanced wavelength division multiplexing (WDM) systems.
arXiv Detail & Related papers (2023-06-25T19:23:42Z) - Twin-field quantum key distribution with partial phase postselection [13.534186932974507]
Quantum key distribution (QKD) allows two remote parties to share information-theoretically secure keys.
Phase-randomization and subsequent postselection play important roles in its security proof.
We propose a TF-QKD protocol with partial phase postselection.
arXiv Detail & Related papers (2022-11-23T03:51:03Z) - Data post-processing for the one-way heterodyne protocol under
composable finite-size security [62.997667081978825]
We study the performance of a practical continuous-variable (CV) quantum key distribution protocol.
We focus on the Gaussian-modulated coherent-state protocol with heterodyne detection in a high signal-to-noise ratio regime.
This allows us to study the performance for practical implementations of the protocol and optimize the parameters connected to the steps above.
arXiv Detail & Related papers (2022-05-20T12:37:09Z) - Reinforcement learning-enhanced protocols for coherent
population-transfer in three-level quantum systems [50.591267188664666]
We deploy a combination of reinforcement learning-based approaches and more traditional optimization techniques to identify optimal protocols for population transfer.
Our approach is able to explore the space of possible control protocols to reveal the existence of efficient protocols.
The new protocols that we identify are robust against both energy losses and dephasing.
arXiv Detail & Related papers (2021-09-02T14:17:30Z) - Discrete-variable quantum key distribution with homodyne detection [14.121646217925441]
We propose a protocol that combines the simplicity of quantum state preparation in DV-QKD together with the cost-effective and high-bandwidth of homodyne detectors used in CV-QKD.
Our simulation suggests that the protocol is suitable for secure and high-speed practical key distribution over distances.
arXiv Detail & Related papers (2021-09-01T17:12:28Z) - Tight Secure Key Rates for CV-QKD with 8PSK Modulation [0.0]
We use a recent numerical security proof approach to calculate tight secure key rates in the presence of collective attacks.
We investigate the influence of radial postselection on the secure key rate.
We suggest strategies to reduce the raw key of 8PSK protocols significantly, only on the cost of a slightly lower secure key rate.
arXiv Detail & Related papers (2021-07-13T14:03:49Z) - Composably secure data processing for Gaussian-modulated continuous
variable quantum key distribution [58.720142291102135]
Continuous-variable quantum key distribution (QKD) employs the quadratures of a bosonic mode to establish a secret key between two remote parties.
We consider a protocol with homodyne detection in the general setting of composable finite-size security.
In particular, we analyze the high signal-to-noise regime which requires the use of high-rate (non-binary) low-density parity check codes.
arXiv Detail & Related papers (2021-03-30T18:02:55Z) - Round-robin differential phase-time-shifting protocol for quantum key
distribution: theory and experiment [58.03659958248968]
Quantum key distribution (QKD) allows the establishment of common cryptographic keys among distant parties.
Recently, a QKD protocol that circumvents the need for monitoring signal disturbance, has been proposed and demonstrated in initial experiments.
We derive the security proofs of the round-robin differential phase-time-shifting protocol in the collective attack scenario.
Our results show that the RRDPTS protocol can achieve higher secret key rate in comparison with the RRDPS, in the condition of high quantum bit error rate.
arXiv Detail & Related papers (2021-03-15T15:20:09Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.