Differential Phase Shift Quantum Secret Sharing Using a Twin Field with
Asymmetric Source Intensities
- URL: http://arxiv.org/abs/2107.10465v1
- Date: Thu, 22 Jul 2021 05:52:50 GMT
- Title: Differential Phase Shift Quantum Secret Sharing Using a Twin Field with
Asymmetric Source Intensities
- Authors: Zhao-Ying Jia, Jie Gu, Bing-Hong Li, Hua-Lei Yin, Zeng-Bing Chen
- Abstract summary: We present a differential phase shift quantum secret sharing protocol with asymmetric source intensities.
Taking finite-key effects into account, our protocol can theoretically obtain the key rate two orders of magnitude higher than that of the original protocol.
Our work is meaningful for the real-life applications of quantum secret sharing.
- Score: 1.2406207242281755
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: As an essential application of quantum mechanics in classical cryptography,
quantum secret sharing has become an indispensable component of quantum
internet. Recently, a differential phase shift quantum secret sharing protocol
using a twin field has been proposed to break the linear rate-distance
boundary. However, this original protocol has a poor performance over channels
with asymmetric transmittances. To make it more practical, we present a
differential phase shift quantum secret sharing protocol with asymmetric source
intensities and give the security proof of our protocol against individual
attacks. Taking finite-key effects into account, our asymmetric protocol can
theoretically obtain the key rate two orders of magnitude higher than that of
the original protocol when the difference in length between Alice's channel and
Bob's is fixed at 14 km. Moreover, our protocol can provide a high key rate
even when the difference is quite large and has great robustness against
finite-key effects. Therefore, our work is meaningful for the real-life
applications of quantum secret sharing.
Related papers
- Towards efficient and secure quantum-classical communication networks [47.27205216718476]
There are two primary approaches to achieving quantum-resistant security: quantum key distribution (QKD) and post-quantum cryptography (PQC)
We introduce the pros and cons of these protocols and explore how they can be combined to achieve a higher level of security and/or improved performance in key distribution.
We hope our discussion inspires further research into the design of hybrid cryptographic protocols for quantum-classical communication networks.
arXiv Detail & Related papers (2024-11-01T23:36:19Z) - Single-Round Proofs of Quantumness from Knowledge Assumptions [41.94295877935867]
A proof of quantumness is an efficiently verifiable interactive test that an efficient quantum computer can pass.
Existing single-round protocols require large quantum circuits, whereas multi-round ones use smaller circuits but require experimentally challenging mid-circuit measurements.
We construct efficient single-round proofs of quantumness based on existing knowledge assumptions.
arXiv Detail & Related papers (2024-05-24T17:33:10Z) - Reliable Quantum Communications based on Asymmetry in Distillation and Coding [35.693513369212646]
We address the problem of reliable provision of entangled qubits in quantum computing schemes.
We combine indirect transmission based on teleportation and distillation; (2) direct transmission, based on quantum error correction (QEC)
Our results show that ad-hoc asymmetric codes give, compared to conventional QEC, a performance boost and codeword size reduction both in a single link and in a quantum network scenario.
arXiv Detail & Related papers (2023-05-01T17:13:23Z) - Multi-User Entanglement Distribution in Quantum Networks Using Multipath
Routing [55.2480439325792]
We propose three protocols that increase the entanglement rate of multi-user applications by leveraging multipath routing.
The protocols are evaluated on quantum networks with NISQ constraints, including limited quantum memories and probabilistic entanglement generation.
arXiv Detail & Related papers (2023-03-06T18:06:00Z) - Breaking universal limitations on quantum conference key agreement
without quantum memory [6.300599548850421]
We report a measurement-device-independent quantum conference key agreement protocol with enhanced transmission efficiency over lossy channel.
Our protocol can break key rate bounds on quantum communication over quantum network without quantum memory.
Based on our results, we anticipate that our protocol will play an indispensable role in constructing multipartite quantum network.
arXiv Detail & Related papers (2022-12-10T06:37:53Z) - Conference key agreement in a quantum network [67.410870290301]
Quantum conference key agreement (QCKA) allows multiple users to establish a secure key from a shared multi-partite entangled state.
In a quantum network, this protocol can be efficiently implemented using a single copy of a N-qubit Greenberger-Horne-Zeilinger (GHZ) state to distil a secure N-user conference key bit.
arXiv Detail & Related papers (2022-07-04T18:00:07Z) - Security of a High Dimensional Two-Way Quantum Key Distribution Protocol [1.827510863075184]
Two-way quantum key distribution protocols utilize bi-directional quantum communication to establish a shared secret key.
We investigate a high-dimensional variant of the Ping Pong protocol and perform an information theoretic security analysis in the finite-key setting.
arXiv Detail & Related papers (2022-03-06T15:36:54Z) - Breaking the Rate-Loss Bound of Quantum Key Distribution with
Asynchronous Two-Photon Interference [16.81040156666027]
A new quantum key distribution protocol can surpass the secret key capacity even without phase tracking and phase locking.
Our work provides a promising candidate for practical scalable quantum communication networks.
arXiv Detail & Related papers (2021-12-22T02:42:43Z) - Scalable High-Rate Twin-Field Quantum Key Distribution Networks without
Constraint of Probability and Intensity [9.67767681743488]
We propose a two-photon twin-field quantum key distribution protocol.
We exploit the non-interference mode as the code mode to highly tolerate interference errors.
Our protocol can transcend the limitations while breaking the secret key capacity of repeaterless quantum key distribution.
arXiv Detail & Related papers (2021-12-21T13:00:28Z) - Interactive Protocols for Classically-Verifiable Quantum Advantage [46.093185827838035]
"Interactions" between a prover and a verifier can bridge the gap between verifiability and implementation.
We demonstrate the first implementation of an interactive quantum advantage protocol, using an ion trap quantum computer.
arXiv Detail & Related papers (2021-12-09T19:00:00Z) - Differential phase shift quantum secret sharing using twin field [10.23503559207364]
Quantum secret sharing essential for multiparty quantum communication.
linear rate-distance limitation severely constrains the secure key rate and transmission distance of QSS.
New protocol is secure against Trojan horse attacks that cannot be resisted by previous differential phase shift QSS.
arXiv Detail & Related papers (2021-04-08T01:48:30Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.