Simple and practical DIQKD security analysis via BB84-type uncertainty
relations and Pauli correlation constraints
- URL: http://arxiv.org/abs/2107.08894v3
- Date: Tue, 18 Oct 2022 08:43:25 GMT
- Title: Simple and practical DIQKD security analysis via BB84-type uncertainty
relations and Pauli correlation constraints
- Authors: Michele Masini, Stefano Pironio, Erik Woodhead
- Abstract summary: In this work, we describe how the conditional entropy can be bounded in the 2-input/2-output setting.
We illustrate the approach on a variant of the device-independent CHSH QKD protocol where both bases are used to generate the key.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: According to the entropy accumulation theorem, proving the unconditional
security of a device-independent quantum key distribution protocol reduces to
deriving tradeoff functions, i.e., bounds on the single-round von Neumann
entropy of the raw key as a function of Bell linear functionals, conditioned on
an eavesdropper's quantum side information. In this work, we describe how the
conditional entropy can be bounded in the 2-input/2-output setting, where the
analysis can be reduced to qubit systems, by combining entropy bounds for
variants of the well-known BB84 protocol with quantum constraints on qubit
operators on the bipartite system shared by Alice and Bob. The approach gives
analytic bounds on the entropy, or semi-analytic ones in reasonable computation
time, which are typically close to optimal. We illustrate the approach on a
variant of the device-independent CHSH QKD protocol where both bases are used
to generate the key as well as on a more refined analysis of the original
single-basis variant with respect to losses. We obtain in particular a
detection efficiency threshold slightly below 80.26%, within reach of current
experimental capabilities.
Related papers
- Bounding the conditional von-Neumann entropy for device independent cryptography and randomness extraction [0.0]
This paper introduces a numerical framework for establishing lower bounds on the conditional von-Neumann entropy in device-independent quantum cryptography and randomness extraction scenarios.
The framework offers an adaptable tool for practical quantum cryptographic protocols, expanding secure communication in untrusted environments.
arXiv Detail & Related papers (2024-11-07T16:48:49Z) - Twin-field-based multi-party quantum key agreement [0.0]
We study a method to extend the twin-field key distribution protocol to a scheme for multi-party quantum key agreement.
We derive the key rate based on the entanglement-based source-replacement scheme.
arXiv Detail & Related papers (2024-09-06T11:51:10Z) - Decoherence-assisted quantum key distribution [37.69303106863453]
We show that our method reduces the amount of information that an eavesdropper can obtain in the BB84 protocol under the entangling probe attack.
We demonstrate experimentally that Alice and Bob can agree on a scheme to that gives low values of the quantum bit error rate.
arXiv Detail & Related papers (2024-05-30T15:28:07Z) - Iterative Qubit Coupled Cluster using only Clifford circuits [36.136619420474766]
An ideal state preparation protocol can be characterized by being easily generated classically.
We propose a method that meets these requirements by introducing a variant of the iterative qubit coupled cluster (iQCC)
We demonstrate the algorithm's correctness in ground-state simulations and extend our study to complex systems like the titanium-based compound Ti(C5H5)(CH3)3 with a (20, 20) active space.
arXiv Detail & Related papers (2022-11-18T20:31:10Z) - Quantum key distribution rates from semidefinite programming [0.0]
We introduce an efficient algorithm for computing the key rate in quantum key distribution protocols.
The resulting algorithm is easy to implement and easy to use.
We use it to reanalyse experimental data to demonstrate how higher key rates can be achieved.
arXiv Detail & Related papers (2022-11-10T17:47:37Z) - Suppressing Amplitude Damping in Trapped Ions: Discrete Weak
Measurements for a Non-unitary Probabilistic Noise Filter [62.997667081978825]
We introduce a low-overhead protocol to reverse this degradation.
We present two trapped-ion schemes for the implementation of a non-unitary probabilistic filter against amplitude damping noise.
This filter can be understood as a protocol for single-copy quasi-distillation.
arXiv Detail & Related papers (2022-09-06T18:18:41Z) - Finite-Key Analysis of Quantum Key Distribution with Characterized
Devices Using Entropy Accumulation [9.316071675613738]
The Entropy Accumulation Theorem (EAT) was introduced to significantly improve the finite-size rates for device-independent quantum information processing tasks.
We present new tools for applying the EAT in the device-dependent setting.
arXiv Detail & Related papers (2022-03-13T03:00:41Z) - Interactive Protocols for Classically-Verifiable Quantum Advantage [46.093185827838035]
"Interactions" between a prover and a verifier can bridge the gap between verifiability and implementation.
We demonstrate the first implementation of an interactive quantum advantage protocol, using an ion trap quantum computer.
arXiv Detail & Related papers (2021-12-09T19:00:00Z) - Composably secure data processing for Gaussian-modulated continuous
variable quantum key distribution [58.720142291102135]
Continuous-variable quantum key distribution (QKD) employs the quadratures of a bosonic mode to establish a secret key between two remote parties.
We consider a protocol with homodyne detection in the general setting of composable finite-size security.
In particular, we analyze the high signal-to-noise regime which requires the use of high-rate (non-binary) low-density parity check codes.
arXiv Detail & Related papers (2021-03-30T18:02:55Z) - Preparation of excited states for nuclear dynamics on a quantum computer [117.44028458220427]
We study two different methods to prepare excited states on a quantum computer.
We benchmark these techniques on emulated and real quantum devices.
These findings show that quantum techniques designed to achieve good scaling on fault tolerant devices might also provide practical benefits on devices with limited connectivity and gate fidelity.
arXiv Detail & Related papers (2020-09-28T17:21:25Z) - Computing conditional entropies for quantum correlations [10.549307055348596]
In particular, we find new upper bounds on the minimal global detection efficiency required to perform device-independent quantum key distribution.
We introduce the family of iterated mean quantum R'enyi divergences with parameters $alpha_k = 1+frac12k-1$ for positive integers $k$.
We show that the corresponding conditional entropies admit a particularly nice form which, in the context of device-independent optimization, can be relaxed to a semidefinite programming problem.
arXiv Detail & Related papers (2020-07-24T15:27:51Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.