Asymptotically Optimal prepare-measure Quantum Key Distribution Protocol
- URL: http://arxiv.org/abs/2110.01973v7
- Date: Sat, 19 Aug 2023 14:03:05 GMT
- Title: Asymptotically Optimal prepare-measure Quantum Key Distribution Protocol
- Authors: Hao Shu
- Abstract summary: In nearly four decades, although substantial QKD protocols are developed, the BB84 protocol and its variants are still the most researched ones.
We present an abstraction of prepare-measure QKD protocols and investigate two special cases which are optimal among all protocols coding by the same states.
Our analysis demonstrates that the optimal QBER bounds coding by qubits are about 27.28$%$ for both memory C-NOT attacks and memoryless C-NOT attacks.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Quantum key distribution (QKD) could be the most significant application of
quantum information theory. In nearly four decades, although substantial QKD
protocols are developed, the BB84 protocol and its variants are still the most
researched ones. It is well-known that the secure bound of qubit error rate
(QBER) of BB84 protocol is about 11$\%$ while it can be increased to 12.6$\%$
by six-state protocol. It would not be surprising that employing more basis
could increase the bound. However, what is the optimal protocol, and how to
analyze it? In this paper, investigations of asymptotically optimal QKD
protocols are proposed. Precisely, We present an abstraction of prepare-measure
QKD protocols and investigate two special cases which are optimal among all
protocols coding by the same states. Our analysis demonstrates that the
asymptotically optimal QBER bounds coding by orthogonal qubits are about
27.28$\%$ for both memory C-NOT attacks and memoryless C-NOT attacks while the
bounds coding by non-orthogonal states in two mutually unbiased bases are about
22.73$\%$ for memory and 28.69$\%$ for memoryless C-NOT attacks. The protocols
are idealized but might be asymptotically realized while their optimality
indicates the ultimate potential of QKD protocols. Although the analysis only
contains a special kind of attack, it provides a framework for investigating
such protocols.
Related papers
- Security of hybrid BB84 with heterodyne detection [0.0]
Quantum key distribution (QKD) promises everlasting security based on the laws of physics.
Recent hybrid QKD protocols have been introduced to leverage advantages from both categories.
We provide a rigorous security proof for a protocol introduced by Qi in 2021, where information is encoded in discrete variables.
arXiv Detail & Related papers (2024-02-26T19:00:01Z) - Comprehensive Analysis of BB84, A Quantum Key Distribution Protocol [0.0]
Quantum Key Distribution (QKD) is a technique that enables secure communication by sharing a secret key.
One of the most well-known QKD protocols is the BB84 protocol, proposed by Charles Bennett and Gilles Brassard in 1984.
arXiv Detail & Related papers (2023-12-09T16:32:54Z) - Quantum Two-Way Communication Protocol Beyond Superdense Coding [36.25599253958745]
We introduce a generalization of one-way superdense coding to two-way communication protocols for transmitting classical bits by using entangled quantum pairs.
The proposed protocol gives a 50% increase in both data rate and energy efficiency compared to the classical protocol.
arXiv Detail & Related papers (2023-09-06T08:48:07Z) - Robust and efficient verification of graph states in blind
measurement-based quantum computation [52.70359447203418]
Blind quantum computation (BQC) is a secure quantum computation method that protects the privacy of clients.
It is crucial to verify whether the resource graph states are accurately prepared in the adversarial scenario.
Here, we propose a robust and efficient protocol for verifying arbitrary graph states with any prime local dimension.
arXiv Detail & Related papers (2023-05-18T06:24:45Z) - New protocols for quantum key distribution with explicit upper and lower
bound on secret-key rate [0.0]
We present two new schemes for quantum key distribution (QKD) which neither require entanglement nor require an ideal single photon source.
The proposed protocols can be implemented using realistic single photon sources which are commercially available.
arXiv Detail & Related papers (2022-12-26T11:14:39Z) - Data post-processing for the one-way heterodyne protocol under
composable finite-size security [62.997667081978825]
We study the performance of a practical continuous-variable (CV) quantum key distribution protocol.
We focus on the Gaussian-modulated coherent-state protocol with heterodyne detection in a high signal-to-noise ratio regime.
This allows us to study the performance for practical implementations of the protocol and optimize the parameters connected to the steps above.
arXiv Detail & Related papers (2022-05-20T12:37:09Z) - QKD parameter estimation by two-universal hashing [0.0]
This paper proposes and proves security of a QKD protocol which uses two-universal hashing instead of random sampling.
This protocol dramatically outperforms previous QKD protocols for small block sizes.
arXiv Detail & Related papers (2021-09-14T14:15:41Z) - Unbalanced-basis-misalignment tolerant measurement-device-independent
quantum key distribution [22.419105320267523]
Measurement-device-independent quantum key distribution (MDIQKD) is a revolutionary protocol since it is physically immune to all attacks on the detection side.
Some protocols release part of the assumptions in the encoding system to keep the practical security, but the performance would be dramatically reduced.
We present a MDIQKD protocol that requires less knowledge of encoding system to combat the troublesome modulation errors and fluctuations.
arXiv Detail & Related papers (2021-08-27T02:16:20Z) - Quantum key distribution based on orthogonal state encoding [0.0]
Two quantum key distribution protocols are presented.
One does not need to employ order-rearrangement techniques while the other needs to.
We modify the protocols for implementing in noisy channels by applying the testing state method.
arXiv Detail & Related papers (2021-07-05T12:14:05Z) - Geometry of Banach spaces: a new route towards Position Based
Cryptography [65.51757376525798]
We study Position Based Quantum Cryptography (PBQC) from the perspective of geometric functional analysis and its connections with quantum games.
The main question we are interested in asks for the optimal amount of entanglement that a coalition of attackers have to share in order to compromise the security of any PBQC protocol.
We show that the understanding of the type properties of some more involved Banach spaces would allow to drop out the assumptions and lead to unconditional lower bounds on the resources used to attack our protocol.
arXiv Detail & Related papers (2021-03-30T13:55:11Z) - Round-robin differential phase-time-shifting protocol for quantum key
distribution: theory and experiment [58.03659958248968]
Quantum key distribution (QKD) allows the establishment of common cryptographic keys among distant parties.
Recently, a QKD protocol that circumvents the need for monitoring signal disturbance, has been proposed and demonstrated in initial experiments.
We derive the security proofs of the round-robin differential phase-time-shifting protocol in the collective attack scenario.
Our results show that the RRDPTS protocol can achieve higher secret key rate in comparison with the RRDPS, in the condition of high quantum bit error rate.
arXiv Detail & Related papers (2021-03-15T15:20:09Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.