Asymptotically Optimal prepare-measure Quantum Key Distribution Protocol
- URL: http://arxiv.org/abs/2110.01973v7
- Date: Sat, 19 Aug 2023 14:03:05 GMT
- Title: Asymptotically Optimal prepare-measure Quantum Key Distribution Protocol
- Authors: Hao Shu
- Abstract summary: In nearly four decades, although substantial QKD protocols are developed, the BB84 protocol and its variants are still the most researched ones.
We present an abstraction of prepare-measure QKD protocols and investigate two special cases which are optimal among all protocols coding by the same states.
Our analysis demonstrates that the optimal QBER bounds coding by qubits are about 27.28$%$ for both memory C-NOT attacks and memoryless C-NOT attacks.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Quantum key distribution (QKD) could be the most significant application of
quantum information theory. In nearly four decades, although substantial QKD
protocols are developed, the BB84 protocol and its variants are still the most
researched ones. It is well-known that the secure bound of qubit error rate
(QBER) of BB84 protocol is about 11$\%$ while it can be increased to 12.6$\%$
by six-state protocol. It would not be surprising that employing more basis
could increase the bound. However, what is the optimal protocol, and how to
analyze it? In this paper, investigations of asymptotically optimal QKD
protocols are proposed. Precisely, We present an abstraction of prepare-measure
QKD protocols and investigate two special cases which are optimal among all
protocols coding by the same states. Our analysis demonstrates that the
asymptotically optimal QBER bounds coding by orthogonal qubits are about
27.28$\%$ for both memory C-NOT attacks and memoryless C-NOT attacks while the
bounds coding by non-orthogonal states in two mutually unbiased bases are about
22.73$\%$ for memory and 28.69$\%$ for memoryless C-NOT attacks. The protocols
are idealized but might be asymptotically realized while their optimality
indicates the ultimate potential of QKD protocols. Although the analysis only
contains a special kind of attack, it provides a framework for investigating
such protocols.
Related papers
- Secure Multi-Party Biometric Verification using QKD assisted Quantum Oblivious Transfer [34.46964288961048]
We present a practical implementation of a secure multiparty computation application enabled by quantum oblivious transfer (QOT)
The QOT protocol uses polarization-encoded entangled states to share oblivious keys between two parties with quantum key distribution (QKD) providing authentication.
A practical use case is demonstrated for privacy-preserving fingerprint matching against no-fly lists from Interpol and the United Nations.
arXiv Detail & Related papers (2025-01-09T15:51:30Z) - Security of hybrid BB84 with heterodyne detection [0.0]
Quantum key distribution (QKD) promises everlasting security based on the laws of physics.
Recent hybrid QKD protocols have been introduced to leverage advantages from both categories.
We provide a rigorous security proof for a protocol introduced by Qi in 2021, where information is encoded in discrete variables.
arXiv Detail & Related papers (2024-02-26T19:00:01Z) - Comprehensive Analysis of BB84, A Quantum Key Distribution Protocol [0.0]
Quantum Key Distribution (QKD) is a technique that enables secure communication by sharing a secret key.
One of the most well-known QKD protocols is the BB84 protocol, proposed by Charles Bennett and Gilles Brassard in 1984.
arXiv Detail & Related papers (2023-12-09T16:32:54Z) - Quantum Two-Way Protocol Beyond Superdense Coding: Joint Transfer of Data and Entanglement [33.2699333323263]
We introduce a generalization of one-way superdense coding to two-way communication protocols for transmitting classical bits by using entangled quantum pairs.
The proposed protocol jointly addresses the provision of entangled pairs and superdense coding, introducing an integrated approach for managing entanglement within the communication protocol.
We present the results of implementing the protocol in a computer simulation based on the NetSquid framework.
arXiv Detail & Related papers (2023-09-06T08:48:07Z) - Robust and efficient verification of graph states in blind
measurement-based quantum computation [52.70359447203418]
Blind quantum computation (BQC) is a secure quantum computation method that protects the privacy of clients.
It is crucial to verify whether the resource graph states are accurately prepared in the adversarial scenario.
Here, we propose a robust and efficient protocol for verifying arbitrary graph states with any prime local dimension.
arXiv Detail & Related papers (2023-05-18T06:24:45Z) - New protocols for quantum key distribution with explicit upper and lower
bound on secret-key rate [0.0]
We present two new schemes for quantum key distribution (QKD) which neither require entanglement nor require an ideal single photon source.
The proposed protocols can be implemented using realistic single photon sources which are commercially available.
arXiv Detail & Related papers (2022-12-26T11:14:39Z) - Data post-processing for the one-way heterodyne protocol under
composable finite-size security [62.997667081978825]
We study the performance of a practical continuous-variable (CV) quantum key distribution protocol.
We focus on the Gaussian-modulated coherent-state protocol with heterodyne detection in a high signal-to-noise ratio regime.
This allows us to study the performance for practical implementations of the protocol and optimize the parameters connected to the steps above.
arXiv Detail & Related papers (2022-05-20T12:37:09Z) - QKD parameter estimation by two-universal hashing [0.0]
This paper proposes and proves security of a QKD protocol which uses two-universal hashing instead of random sampling.
This protocol dramatically outperforms previous QKD protocols for small block sizes.
arXiv Detail & Related papers (2021-09-14T14:15:41Z) - Quantum key distribution based on orthogonal state encoding [0.0]
Two quantum key distribution protocols are presented.
One does not need to employ order-rearrangement techniques while the other needs to.
We modify the protocols for implementing in noisy channels by applying the testing state method.
arXiv Detail & Related papers (2021-07-05T12:14:05Z) - Geometry of Banach spaces: a new route towards Position Based
Cryptography [65.51757376525798]
We study Position Based Quantum Cryptography (PBQC) from the perspective of geometric functional analysis and its connections with quantum games.
The main question we are interested in asks for the optimal amount of entanglement that a coalition of attackers have to share in order to compromise the security of any PBQC protocol.
We show that the understanding of the type properties of some more involved Banach spaces would allow to drop out the assumptions and lead to unconditional lower bounds on the resources used to attack our protocol.
arXiv Detail & Related papers (2021-03-30T13:55:11Z) - Round-robin differential phase-time-shifting protocol for quantum key
distribution: theory and experiment [58.03659958248968]
Quantum key distribution (QKD) allows the establishment of common cryptographic keys among distant parties.
Recently, a QKD protocol that circumvents the need for monitoring signal disturbance, has been proposed and demonstrated in initial experiments.
We derive the security proofs of the round-robin differential phase-time-shifting protocol in the collective attack scenario.
Our results show that the RRDPTS protocol can achieve higher secret key rate in comparison with the RRDPS, in the condition of high quantum bit error rate.
arXiv Detail & Related papers (2021-03-15T15:20:09Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.