Fidelity Bounds for Device-Independent Advantage Distillation
- URL: http://arxiv.org/abs/2105.03213v3
- Date: Mon, 9 Jan 2023 00:33:56 GMT
- Title: Fidelity Bounds for Device-Independent Advantage Distillation
- Authors: Thomas A. Hahn, Ernest Y.-Z. Tan
- Abstract summary: We develop an algorithm that returns arbitrarily tight lower bounds on the fidelity of a device-independent repetition-code protocol.
Our results give new insight on how strong the fidelity-related security conditions are, and could also be used to compute some lower bounds on one-way protocol keyrates.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: It is known that advantage distillation (that is, information reconciliation
using two-way communication) improves noise tolerances for quantum key
distribution (QKD) setups. Two-way communication is hence also of interest in
the device-independent case, where noise tolerance bounds for one-way error
correction are currently too low to be experimentally feasible. Existing
security proofs for the device-independent repetition-code protocol (the most
prominent form of advantage distillation) rely on fidelity-related security
conditions, but previous bounds on the fidelity were not tight. We improve on
those results by developing an algorithm that returns arbitrarily tight lower
bounds on the fidelity. Our results give new insight on how strong the
fidelity-related security conditions are, and could also be used to compute
some lower bounds on one-way protocol keyrates. Finally, we conjecture a
necessary security condition for the protocol studied in this work, that
naturally complements the existing sufficient conditions.
Related papers
- Dimensional advantage in secure information trading via the noisy dense coding protocol [0.0]
We present the DC-based QKD protocol for higher dimensional systems.
We report the lower bounds on secret key rate, when the shared state is a two-qudit maximally entangled state.
We prove that the set of useless states in the DC-based QKD protocol is convex and compact.
arXiv Detail & Related papers (2023-10-31T17:50:48Z) - General treatment of Gaussian trusted noise in continuous variable
quantum key distribution [1.0499611180329804]
A trusted device scenario assumes that an adversary has no access to imperfections such as electronic noises in the detector is expected to provide significant improvement in the key rate.
Here, we develop a simple and general treatment that can incorporate the effects of Gaussian trusted noises for any protocol that uses homodyne/heterodyne measurements.
In our method, a rescaling of the outcome of a noisy homodyne/heterodyne detector renders it equivalent to the outcome of a noiseless detector with a tiny additional loss.
arXiv Detail & Related papers (2023-05-28T10:38:36Z) - The Quantum Chernoff Divergence in Advantage Distillation for QKD and
DIQKD [0.0]
Device-independent quantum key distribution (DIQKD) aims to mitigate adversarial exploitation of imperfections in quantum devices.
We present an alternative proof structure that replaces the fidelity with the quantum Chernoff divergence.
Our results provide insight into a fundamental question in quantum information theory regarding the circumstances under which DIQKD is possible.
arXiv Detail & Related papers (2022-12-14T01:44:23Z) - Upper bounds on key rates in device-independent quantum key distribution
based on convex-combination attacks [1.118478900782898]
We present the convex-combination attack as an efficient, easy-to-use technique for upper-bounding DIQKD key rates.
It allows verifying the accuracy of lower bounds on key rates for state-of-the-art protocols.
arXiv Detail & Related papers (2022-06-13T15:27:48Z) - Data post-processing for the one-way heterodyne protocol under
composable finite-size security [62.997667081978825]
We study the performance of a practical continuous-variable (CV) quantum key distribution protocol.
We focus on the Gaussian-modulated coherent-state protocol with heterodyne detection in a high signal-to-noise ratio regime.
This allows us to study the performance for practical implementations of the protocol and optimize the parameters connected to the steps above.
arXiv Detail & Related papers (2022-05-20T12:37:09Z) - Shannon theory for quantum systems and beyond: information compression
for fermions [68.8204255655161]
We show that entanglement fidelity in the fermionic case is capable of evaluating the preservation of correlations.
We introduce a fermionic version of the source coding theorem showing that, as in the quantum case, the von Neumann entropy is the minimal rate for which a fermionic compression scheme exists.
arXiv Detail & Related papers (2021-06-09T10:19:18Z) - Homodyne Detection Quadrature Phase Shift Keying Continuous-Variable
Quantum Key Distribution with High Excess Noise Tolerance [7.87972015113057]
We propose a homodyne detection protocol using the quadrature phase shift keying technique.
By limiting information leakage, our proposed protocol enhances excess noise tolerance to a high level.
Our results imply that the current protocol is able to distribute keys in nearly intercity area.
arXiv Detail & Related papers (2021-04-22T16:10:35Z) - Composably secure data processing for Gaussian-modulated continuous
variable quantum key distribution [58.720142291102135]
Continuous-variable quantum key distribution (QKD) employs the quadratures of a bosonic mode to establish a secret key between two remote parties.
We consider a protocol with homodyne detection in the general setting of composable finite-size security.
In particular, we analyze the high signal-to-noise regime which requires the use of high-rate (non-binary) low-density parity check codes.
arXiv Detail & Related papers (2021-03-30T18:02:55Z) - Entanglement-assisted entanglement purification [62.997667081978825]
We present a new class of entanglement-assisted entanglement purification protocols that can generate high-fidelity entanglement from noisy, finite-size ensembles.
Our protocols can deal with arbitrary errors, but are best suited for few errors, and work particularly well for decay noise.
arXiv Detail & Related papers (2020-11-13T19:00:05Z) - Efficient and robust certification of genuine multipartite entanglement
in noisy quantum error correction circuits [58.720142291102135]
We introduce a conditional witnessing technique to certify genuine multipartite entanglement (GME)
We prove that the detection of entanglement in a linear number of bipartitions by a number of measurements scales linearly, suffices to certify GME.
We apply our method to the noisy readout of stabilizer operators of the distance-three topological color code and its flag-based fault-tolerant version.
arXiv Detail & Related papers (2020-10-06T18:00:07Z) - On Lower Bounds for Standard and Robust Gaussian Process Bandit
Optimization [55.937424268654645]
We consider algorithm-independent lower bounds for the problem of black-box optimization of functions having a bounded norm.
We provide a novel proof technique for deriving lower bounds on the regret, with benefits including simplicity, versatility, and an improved dependence on the error probability.
arXiv Detail & Related papers (2020-08-20T03:48:14Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.