Analysis of a High-Dimensional Extended B92 Protocol
- URL: http://arxiv.org/abs/2106.11460v1
- Date: Tue, 22 Jun 2021 00:40:48 GMT
- Title: Analysis of a High-Dimensional Extended B92 Protocol
- Authors: Hasan Iqbal, Walter O. Krawec
- Abstract summary: Quantum key distribution allows two parties to establish a shared secret key that is secure against all-powerful adversaries.
One such protocol named B92 is quite appealing due to its simplicity but is highly sensitive to channel noise.
We investigate a high-dimensional variant of an extended version of the B92 protocol and show that it can distill a key over high noise channels.
- Score: 2.335152769484957
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Quantum key distribution (QKD) allows two parties to establish a shared
secret key that is secure against all-powerful adversaries. One such protocol
named B92 is quite appealing due to its simplicity but is highly sensitive to
channel noise. In this work, we investigate a high-dimensional variant of an
extended version of the B92 protocol and show that it can distill a key over
high noise channels. The protocol we consider requires that Alice send only
three high-dimensional states and Bob only perform partial measurements. We
perform an information-theoretic security analysis of our protocol and compare
its key rate to that of a high-dimensional BB84 protocol over depolarization
and amplitude damping channels.
Related papers
- Decoherence-assisted quantum key distribution [37.69303106863453]
We show that our method reduces the amount of information that an eavesdropper can obtain in the BB84 protocol under the entangling probe attack.
We demonstrate experimentally that Alice and Bob can agree on a scheme to that gives low values of the quantum bit error rate.
arXiv Detail & Related papers (2024-05-30T15:28:07Z) - Analysing QBER and secure key rate under various losses for satellite
based free space QKD [0.0]
We have done a comparison between the BB84 and B92 protocols and BBM92 and E91 entanglement based protocols for satellite based uplink and downlink in low Earth orbit.
The results indicate that, when compared to the B92 protocol, the BB84 protocol guarantees the distribution of a higher secure keyrate for a specific distance.
arXiv Detail & Related papers (2023-08-02T09:28:50Z) - New Security Proof of a Restricted High-Dimensional QKD Protocol [3.58975348104054]
High-dimensional (HD) states are known to have several interesting properties when applied to quantum cryptography.
This paper revisits a particular HD-QKD protocol, which does not require Alice and Bob to be capable of sending and measuring in full mutually unbiased bases.
We provide a new proof of security, and give an explicit key-rate equation for depolarization channels, allowing us to evaluate the key-rate for arbitrarily high dimensional states.
arXiv Detail & Related papers (2023-07-18T19:18:28Z) - Satellite-Based Quantum Key Distribution in the Presence of Bypass
Channels [44.81834231082477]
Security of quantum key distribution under restricted eavesdropping scenarios is addressed.
We find regimes of operation in which the above restrictions on Eve can considerably improve system performance.
Our work opens up new security frameworks for spaceborne quantum communications systems.
arXiv Detail & Related papers (2022-12-09T12:24:40Z) - QKD in the NISQ era: enhancing secure key rates via quantum error
correction [2.209900332048239]
We obtain the secure key rates of BB84, B92 and BBM92 QKD protocols over a quantum channel subject to amplitude-damping noise.
We implement an error-corrected BB84 protocol using dual-rail encoding on a noisy quantum processor.
arXiv Detail & Related papers (2022-10-11T09:47:14Z) - Thermal relaxation error on QKD: Effect and A Probable Bypass [0.0]
Quantum cryptography was proposed as a counter to the capacity of quantum computers to break classical cryptosystems.
We study the performance of two QKD protocols - BB84 and E91 under thermal relaxation error.
arXiv Detail & Related papers (2022-07-04T01:46:41Z) - Data post-processing for the one-way heterodyne protocol under
composable finite-size security [62.997667081978825]
We study the performance of a practical continuous-variable (CV) quantum key distribution protocol.
We focus on the Gaussian-modulated coherent-state protocol with heterodyne detection in a high signal-to-noise ratio regime.
This allows us to study the performance for practical implementations of the protocol and optimize the parameters connected to the steps above.
arXiv Detail & Related papers (2022-05-20T12:37:09Z) - Security of a High Dimensional Two-Way Quantum Key Distribution Protocol [1.827510863075184]
Two-way quantum key distribution protocols utilize bi-directional quantum communication to establish a shared secret key.
We investigate a high-dimensional variant of the Ping Pong protocol and perform an information theoretic security analysis in the finite-key setting.
arXiv Detail & Related papers (2022-03-06T15:36:54Z) - Composably secure data processing for Gaussian-modulated continuous
variable quantum key distribution [58.720142291102135]
Continuous-variable quantum key distribution (QKD) employs the quadratures of a bosonic mode to establish a secret key between two remote parties.
We consider a protocol with homodyne detection in the general setting of composable finite-size security.
In particular, we analyze the high signal-to-noise regime which requires the use of high-rate (non-binary) low-density parity check codes.
arXiv Detail & Related papers (2021-03-30T18:02:55Z) - Round-robin differential phase-time-shifting protocol for quantum key
distribution: theory and experiment [58.03659958248968]
Quantum key distribution (QKD) allows the establishment of common cryptographic keys among distant parties.
Recently, a QKD protocol that circumvents the need for monitoring signal disturbance, has been proposed and demonstrated in initial experiments.
We derive the security proofs of the round-robin differential phase-time-shifting protocol in the collective attack scenario.
Our results show that the RRDPTS protocol can achieve higher secret key rate in comparison with the RRDPS, in the condition of high quantum bit error rate.
arXiv Detail & Related papers (2021-03-15T15:20:09Z) - Entanglement purification by counting and locating errors with
entangling measurements [62.997667081978825]
We consider entanglement purification protocols for multiple copies of qubit states.
We use high-dimensional auxiliary entangled systems to learn about number and positions of errors in the noisy ensemble.
arXiv Detail & Related papers (2020-11-13T19:02:33Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.