Device-independent quantum key distribution with random postselection
- URL: http://arxiv.org/abs/2110.02701v2
- Date: Mon, 21 Mar 2022 02:23:01 GMT
- Title: Device-independent quantum key distribution with random postselection
- Authors: Feihu Xu, Yu-Zhe Zhang, Qiang Zhang, Jian-Wei Pan
- Abstract summary: Device-independent quantum key distribution (QKD) can permit the superior security even with unknown devices.
In photonic setup, due to the limited detection efficiency, a large amount of the data generates from no-detection events which contain little correlations but contribute high errors.
Here we propose the device-independent QKD protocol with random post selection, where the secret keys are extracted only from the post-selected subset of outcomes.
- Score: 11.55318342565654
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Device-independent quantum key distribution (QKD) can permit the superior
security even with unknown devices. In practice, however, the realization of
device-independent QKD is technically challenging because of its low noise
tolerance. In photonic setup, due to the limited detection efficiency, a large
amount of the data generates from no-detection events which contain little
correlations but contribute high errors. Here we propose the device-independent
QKD protocol with random post selection, where the secret keys are extracted
only from the post-selected subset of outcomes. This could not open the
detection loophole as long as the entropy of the post-selected subset is
evaluated from the information of the entire set of data, including both
detection and no-detection events. This post selection has the advantage to
significantly reduce the error events, thus relaxing the threshold of required
detection efficiency. In the model of collective attacks, our protocol can
tolerate detector efficiency as low as 68.5%, which goes beyond standard
security proofs. The results make a concrete step for the implementation of
device-independent QKD in practice.
Related papers
- Device-independent quantum key distribution based on routed Bell tests [0.0]
We investigate DIQKD protocols based on a routed setup.
In these protocols, photons from the source are routed by an actively controlled switch to a nearby test device instead of the distant one.
We find that in an ideal case routed DIQKD protocols can significantly improve detection efficiency requirements, by up to $sim 30%$.
arXiv Detail & Related papers (2024-04-01T15:59:09Z) - Entropy bounds for device-independent quantum key distribution with local Bell test [0.0]
One of the main challenges in device-independent quantum key distribution (DIQKD) is achieving the required Bell violation over long distances.
Recent works have explored the concept of certifying nonlocal correlations over extended distances through the use of a local Bell test.
Here, an additional quantum device is placed in close proximity to one party, using short-distance correlations to verify nonlocal behavior at long distances.
arXiv Detail & Related papers (2024-03-31T20:33:40Z) - Efficient Device-Independent Quantum Key Distribution [4.817429789586127]
Device-independent quantum key distribution (DIQKD) is a key distribution scheme whose security is based on the laws of quantum physics.
We propose an efficient device-independent quantum key distribution protocol in which one participant prepares states and transmits them to another participant.
arXiv Detail & Related papers (2023-11-16T13:01:34Z) - Testing randomness of series generated in Bell's experiment [62.997667081978825]
We use a toy fiber optic based setup to generate binary series, and evaluate their level of randomness according to Ville principle.
Series are tested with a battery of standard statistical indicators, Hurst, Kolmogorov complexity, minimum entropy, Takensarity dimension of embedding, and Augmented Dickey Fuller and Kwiatkowski Phillips Schmidt Shin to check station exponent.
The level of randomness of series obtained by applying Toeplitz extractor to rejected series is found to be indistinguishable from the level of non-rejected raw ones.
arXiv Detail & Related papers (2022-08-31T17:39:29Z) - Upper bounds on key rates in device-independent quantum key distribution
based on convex-combination attacks [1.118478900782898]
We present the convex-combination attack as an efficient, easy-to-use technique for upper-bounding DIQKD key rates.
It allows verifying the accuracy of lower bounds on key rates for state-of-the-art protocols.
arXiv Detail & Related papers (2022-06-13T15:27:48Z) - Data post-processing for the one-way heterodyne protocol under
composable finite-size security [62.997667081978825]
We study the performance of a practical continuous-variable (CV) quantum key distribution protocol.
We focus on the Gaussian-modulated coherent-state protocol with heterodyne detection in a high signal-to-noise ratio regime.
This allows us to study the performance for practical implementations of the protocol and optimize the parameters connected to the steps above.
arXiv Detail & Related papers (2022-05-20T12:37:09Z) - Fault-tolerant parity readout on a shuttling-based trapped-ion quantum
computer [64.47265213752996]
We experimentally demonstrate a fault-tolerant weight-4 parity check measurement scheme.
We achieve a flag-conditioned parity measurement single-shot fidelity of 93.2(2)%.
The scheme is an essential building block in a broad class of stabilizer quantum error correction protocols.
arXiv Detail & Related papers (2021-07-13T20:08:04Z) - Sample-efficient device-independent quantum state verification and
certification [68.8204255655161]
Authentication of quantum sources is a crucial task in building reliable and efficient protocols for quantum-information processing.
We develop a systematic approach to device-independent verification of quantum states free of IID assumptions in the finite copy regime.
We show that device-independent verification can be performed with optimal sample efficiency.
arXiv Detail & Related papers (2021-05-12T17:48:04Z) - Composably secure data processing for Gaussian-modulated continuous
variable quantum key distribution [58.720142291102135]
Continuous-variable quantum key distribution (QKD) employs the quadratures of a bosonic mode to establish a secret key between two remote parties.
We consider a protocol with homodyne detection in the general setting of composable finite-size security.
In particular, we analyze the high signal-to-noise regime which requires the use of high-rate (non-binary) low-density parity check codes.
arXiv Detail & Related papers (2021-03-30T18:02:55Z) - Round-robin differential phase-time-shifting protocol for quantum key
distribution: theory and experiment [58.03659958248968]
Quantum key distribution (QKD) allows the establishment of common cryptographic keys among distant parties.
Recently, a QKD protocol that circumvents the need for monitoring signal disturbance, has been proposed and demonstrated in initial experiments.
We derive the security proofs of the round-robin differential phase-time-shifting protocol in the collective attack scenario.
Our results show that the RRDPTS protocol can achieve higher secret key rate in comparison with the RRDPS, in the condition of high quantum bit error rate.
arXiv Detail & Related papers (2021-03-15T15:20:09Z) - Afterpulsing Effect on the Baseline System Error Rate and on the
Decoy-State Quantum Key Distribution Protocols [0.0]
We develop a theoretical analysis of afterpulsing effect on the decoy-state QKD protocols for multiple detectors.
Results can be used as a guide for every practical decoy-state QKD protocol implementation in real-world deployments.
arXiv Detail & Related papers (2020-10-07T12:06:23Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.