Upper bounds on device-independent quantum key distribution rates in
static and dynamic scenarios
- URL: http://arxiv.org/abs/2107.06411v1
- Date: Tue, 13 Jul 2021 22:01:09 GMT
- Title: Upper bounds on device-independent quantum key distribution rates in
static and dynamic scenarios
- Authors: Eneet Kaur, Karol Horodecki, Siddhartha Das
- Abstract summary: We develop upper bounds for key rates for device-independent quantum key distribution (DI-QKD) protocols and devices.
We show that the convex hull of the currently known bounds is a tighter upper bound on the device-independent key rates of standard CHSH-based protocol.
We show that the device-independent private capacity for the CHSH based protocols on depolarizing and erasure channels is limited by the secret key capacity of dephasing channels.
- Score: 3.3399953831968334
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: In this work, we develop upper bounds for key rates for device-independent
quantum key distribution (DI-QKD) protocols and devices. We study the reduced
cc-squashed entanglement and show that it is a convex functional. As a result,
we show that the convex hull of the currently known bounds is a tighter upper
bound on the device-independent key rates of standard CHSH-based protocol. We
further provide tighter bounds for DI-QKD key rates achievable by any protocol
applied to the CHSH-based device. This bound is based on reduced relative
entropy of entanglement optimized over decompositions into local and non-local
parts. In the dynamical scenario of quantum channels, we obtain upper bounds
for device-independent private capacity for the CHSH based protocols. We show
that the device-independent private capacity for the CHSH based protocols on
depolarizing and erasure channels is limited by the secret key capacity of
dephasing channels.
Related papers
- Extending Quantum Perceptrons: Rydberg Devices, Multi-Class Classification, and Error Tolerance [67.77677387243135]
Quantum Neuromorphic Computing (QNC) merges quantum computation with neural computation to create scalable, noise-resilient algorithms for quantum machine learning (QML)
At the core of QNC is the quantum perceptron (QP), which leverages the analog dynamics of interacting qubits to enable universal quantum computation.
arXiv Detail & Related papers (2024-11-13T23:56:20Z) - Device-Independent Quantum Key Distribution beyond qubits [0.0]
Device-Independent Quantum Key Distribution (DIQKD) aims to generate secret keys between two parties without relying on trust in their employed devices.
This study explores the resilience of high-dimensional quantum systems in DIQKD, focusing on a comparison between qubits and qutrits.
arXiv Detail & Related papers (2024-01-31T20:36:48Z) - Practical quantum secure direct communication with squeezed states [55.41644538483948]
We report the first table-top experimental demonstration of a CV-QSDC system and assess its security.
This realization paves the way into future threat-less quantum metropolitan networks, compatible with coexisting advanced wavelength division multiplexing (WDM) systems.
arXiv Detail & Related papers (2023-06-25T19:23:42Z) - Overcoming fundamental bounds on quantum conference key agreement [0.0]
Twin-Field Quantum Key Distribution (TF-QKD) enables two distant parties to establish a shared secret key.
TF-QKD is the only scheme capable of beating the repeaterless bound on the bipartite private capacity.
We propose a practical conference key agreement protocol that only uses WCPs and linear optics and prove its security with a multiparty decoy-state method.
arXiv Detail & Related papers (2022-11-28T17:09:41Z) - Conference key agreement in a quantum network [67.410870290301]
Quantum conference key agreement (QCKA) allows multiple users to establish a secure key from a shared multi-partite entangled state.
In a quantum network, this protocol can be efficiently implemented using a single copy of a N-qubit Greenberger-Horne-Zeilinger (GHZ) state to distil a secure N-user conference key bit.
arXiv Detail & Related papers (2022-07-04T18:00:07Z) - Upper bounds on key rates in device-independent quantum key distribution
based on convex-combination attacks [1.118478900782898]
We present the convex-combination attack as an efficient, easy-to-use technique for upper-bounding DIQKD key rates.
It allows verifying the accuracy of lower bounds on key rates for state-of-the-art protocols.
arXiv Detail & Related papers (2022-06-13T15:27:48Z) - Data post-processing for the one-way heterodyne protocol under
composable finite-size security [62.997667081978825]
We study the performance of a practical continuous-variable (CV) quantum key distribution protocol.
We focus on the Gaussian-modulated coherent-state protocol with heterodyne detection in a high signal-to-noise ratio regime.
This allows us to study the performance for practical implementations of the protocol and optimize the parameters connected to the steps above.
arXiv Detail & Related papers (2022-05-20T12:37:09Z) - Fundamental limitations on the device-independent quantum conference key
agreement [3.3399953831968334]
We study the rate of a key secure against a quantum adversary in the device-independent conference key agreement (DI-CKA) scenario.
We show that the gap between the DI-CKA rate and the device-dependent rate is inherited from the bipartite gap between device-independent and device-dependent key rates.
arXiv Detail & Related papers (2021-11-03T18:45:23Z) - Overcoming the rate-distance limit of device-independent quantum key
distribution [7.864517207531803]
Device-independent quantum key distribution (DIQKD) exploits the violation of a Bell inequality to extract secure key.
We propose a heralded DIQKD scheme based on entangled coherent states to improve entangling rates.
arXiv Detail & Related papers (2021-03-31T14:58:46Z) - Composably secure data processing for Gaussian-modulated continuous
variable quantum key distribution [58.720142291102135]
Continuous-variable quantum key distribution (QKD) employs the quadratures of a bosonic mode to establish a secret key between two remote parties.
We consider a protocol with homodyne detection in the general setting of composable finite-size security.
In particular, we analyze the high signal-to-noise regime which requires the use of high-rate (non-binary) low-density parity check codes.
arXiv Detail & Related papers (2021-03-30T18:02:55Z) - Round-robin differential phase-time-shifting protocol for quantum key
distribution: theory and experiment [58.03659958248968]
Quantum key distribution (QKD) allows the establishment of common cryptographic keys among distant parties.
Recently, a QKD protocol that circumvents the need for monitoring signal disturbance, has been proposed and demonstrated in initial experiments.
We derive the security proofs of the round-robin differential phase-time-shifting protocol in the collective attack scenario.
Our results show that the RRDPTS protocol can achieve higher secret key rate in comparison with the RRDPS, in the condition of high quantum bit error rate.
arXiv Detail & Related papers (2021-03-15T15:20:09Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.