Finite-key Analysis for Quantum Conference Key Agreement with Asymmetric
Channels
- URL: http://arxiv.org/abs/2109.11163v1
- Date: Thu, 23 Sep 2021 06:36:31 GMT
- Title: Finite-key Analysis for Quantum Conference Key Agreement with Asymmetric
Channels
- Authors: Zhao Li, Xiao-Yu Cao, Chen-Long Li, Chen-Xun Weng, Jie Gu, Hua-Lei
Yin, Zeng-Bing Chen
- Abstract summary: Quantum conference key agreement (QCKA) provides unconditional secret keys among multiple parties.
Some QCKA protocols employing twin-field was proposed to promote transmission distance.
Here, we consider a tripartite QCKA protocol utilizing the idea of sending-or-not-sending twin-field scheme.
- Score: 12.576252829963096
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: As an essential ingredient of quantum networks, quantum conference key
agreement (QCKA) provides unconditional secret keys among multiple parties,
which enables only legitimate users to decrypt the encrypted message. Recently,
some QCKA protocols employing twin-field was proposed to promote transmission
distance. These protocols, however, suffer from relatively low conference key
rate and short transmission distance over asymmetric channels, which demands a
prompt solution in practice. Here, we consider a tripartite QCKA protocol
utilizing the idea of sending-or-not-sending twin-field scheme and propose a
high-efficiency QCKA over asymmetric channels by removing the symmetry
parameters condition. Besides, we provide a composable finite-key analysis with
rigorous security proof against general attacks by exploiting the entropic
uncertainty relation for multiparty system. Our protocol greatly improves the
feasibility to establish conference keys over asymmetric channels.
Related papers
- Practical hybrid PQC-QKD protocols with enhanced security and performance [44.8840598334124]
We develop hybrid protocols by which QKD and PQC inter-operate within a joint quantum-classical network.
In particular, we consider different hybrid designs that may offer enhanced speed and/or security over the individual performance of either approach.
arXiv Detail & Related papers (2024-11-02T00:02:01Z) - Towards efficient and secure quantum-classical communication networks [47.27205216718476]
There are two primary approaches to achieving quantum-resistant security: quantum key distribution (QKD) and post-quantum cryptography (PQC)
We introduce the pros and cons of these protocols and explore how they can be combined to achieve a higher level of security and/or improved performance in key distribution.
We hope our discussion inspires further research into the design of hybrid cryptographic protocols for quantum-classical communication networks.
arXiv Detail & Related papers (2024-11-01T23:36:19Z) - Twin-field-based multi-party quantum key agreement [0.0]
We study a method to extend the twin-field key distribution protocol to a scheme for multi-party quantum key agreement.
We derive the key rate based on the entanglement-based source-replacement scheme.
arXiv Detail & Related papers (2024-09-06T11:51:10Z) - Finite-Key Analysis for Coherent One-Way Quantum Key Distribution [18.15943439545963]
Coherent-one-way (COW) quantum key distribution (QKD) is a significant communication protocol that has been implemented experimentally and deployed in practical products.
Existing security analyses of COW-QKD either provide a short transmission distance or lack immunity against coherent attacks in the finite-key regime.
We present a tight finite-key framework for a variant of COW-QKD, which has been proven to extend the secure transmission distance in the case.
arXiv Detail & Related papers (2023-09-28T03:32:06Z) - Practical quantum secure direct communication with squeezed states [55.41644538483948]
We report the first table-top experimental demonstration of a CV-QSDC system and assess its security.
This realization paves the way into future threat-less quantum metropolitan networks, compatible with coexisting advanced wavelength division multiplexing (WDM) systems.
arXiv Detail & Related papers (2023-06-25T19:23:42Z) - Conference key agreement in a quantum network [67.410870290301]
Quantum conference key agreement (QCKA) allows multiple users to establish a secure key from a shared multi-partite entangled state.
In a quantum network, this protocol can be efficiently implemented using a single copy of a N-qubit Greenberger-Horne-Zeilinger (GHZ) state to distil a secure N-user conference key bit.
arXiv Detail & Related papers (2022-07-04T18:00:07Z) - Data post-processing for the one-way heterodyne protocol under
composable finite-size security [62.997667081978825]
We study the performance of a practical continuous-variable (CV) quantum key distribution protocol.
We focus on the Gaussian-modulated coherent-state protocol with heterodyne detection in a high signal-to-noise ratio regime.
This allows us to study the performance for practical implementations of the protocol and optimize the parameters connected to the steps above.
arXiv Detail & Related papers (2022-05-20T12:37:09Z) - Scalable Mediated Semi-quantum Key Distribution [5.548873288570182]
Mediated semi-quantum key distribution (M-SQKD) permits two limited "semi-quantum" or "classical" users to establish a secret key with the help of a third party (TP)
Several protocols have been studied recently for two-party scenarios, but no one has considered M-SQKD for multi-party scenarios.
arXiv Detail & Related papers (2022-05-13T09:21:12Z) - High-Dimensional Quantum Conference Key Agreement [1.827510863075184]
Quantum Conference Key Agreement (QCKA) protocols are designed to allow multiple parties to agree on a shared secret key.
In this paper, we consider a high-dimensional QCKA protocol and prove its information theoretic security against arbitrary, general, attacks in the finite-key scenario.
arXiv Detail & Related papers (2022-01-31T23:06:31Z) - Secure communication over generalised quantum multiple access channels [1.251280464827565]
We provide the formula for the achievable rate region of secure communication in the scenario of two senders and a single receiver.
We explicitly specify a protocol for secure communication in this scenario, which employs superdense coding.
We prove the security of the protocol against general quantum attacks, analyze different strategies of the eavesdropper and compute the key rate for a range of noisy quantum channels.
arXiv Detail & Related papers (2021-06-24T20:40:12Z) - Round-robin differential phase-time-shifting protocol for quantum key
distribution: theory and experiment [58.03659958248968]
Quantum key distribution (QKD) allows the establishment of common cryptographic keys among distant parties.
Recently, a QKD protocol that circumvents the need for monitoring signal disturbance, has been proposed and demonstrated in initial experiments.
We derive the security proofs of the round-robin differential phase-time-shifting protocol in the collective attack scenario.
Our results show that the RRDPTS protocol can achieve higher secret key rate in comparison with the RRDPS, in the condition of high quantum bit error rate.
arXiv Detail & Related papers (2021-03-15T15:20:09Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.