Fundamental limitations on the device-independent quantum conference key
agreement
- URL: http://arxiv.org/abs/2111.02467v2
- Date: Thu, 12 Jan 2023 18:37:58 GMT
- Title: Fundamental limitations on the device-independent quantum conference key
agreement
- Authors: Karol Horodecki and Marek Winczewski and Siddhartha Das
- Abstract summary: We study the rate of a key secure against a quantum adversary in the device-independent conference key agreement (DI-CKA) scenario.
We show that the gap between the DI-CKA rate and the device-dependent rate is inherited from the bipartite gap between device-independent and device-dependent key rates.
- Score: 3.3399953831968334
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: We provide several general upper bounds on the rate of a key secure against a
quantum adversary in the device-independent conference key agreement (DI-CKA)
scenario. They include bounds by reduced entanglement measures and those based
on multipartite secrecy monotones such as a multipartite squashed
entanglement-based measure, which we refer to as reduced c-squashed
entanglement. We compare the latter bound with the known lower bound for the
protocol of conference key distillation based on the parity
Clauser-Horne-Shimony-Holt game. We also show that the gap between the DI-CKA
rate and the device-dependent rate is inherited from the bipartite gap between
device-independent and device-dependent key rates, giving examples that exhibit
the strict gap.
Related papers
- Device-Independent Quantum Key Distribution beyond qubits [0.0]
Device-Independent Quantum Key Distribution (DIQKD) aims to generate secret keys between two parties without relying on trust in their employed devices.
This study explores the resilience of high-dimensional quantum systems in DIQKD, focusing on a comparison between qubits and qutrits.
arXiv Detail & Related papers (2024-01-31T20:36:48Z) - Experimental anonymous quantum conferencing [72.27323884094953]
We experimentally implement the AQCKA task in a six-user quantum network using Greenberger-Horne-Zeilinger (GHZ)-state entanglement.
We also demonstrate that the protocol retains an advantage in a four-user scenario with finite key effects taken into account.
arXiv Detail & Related papers (2023-11-23T19:00:01Z) - How to harness high-dimensional temporal entanglement, using limited
interferometry setups [62.997667081978825]
We develop the first complete analysis of high-dimensional entanglement in the polarization-time-domain.
We show how to efficiently certify relevant density matrix elements and security parameters for Quantum Key Distribution.
We propose a novel setup that can further enhance the noise resistance of free-space quantum communication.
arXiv Detail & Related papers (2023-08-08T17:44:43Z) - Multipartite entanglement theory with entanglement-nonincreasing
operations [91.3755431537592]
We extend the resource theory of entanglement for multipartite systems beyond the standard framework of local operations and classical communication.
We demonstrate that in this adjusted framework, the transformation rates between multipartite states are fundamentally dictated by the bipartite entanglement entropies of the respective quantum states.
arXiv Detail & Related papers (2023-05-30T12:53:56Z) - Overcoming fundamental bounds on quantum conference key agreement [0.0]
Twin-Field Quantum Key Distribution (TF-QKD) enables two distant parties to establish a shared secret key.
TF-QKD is the only scheme capable of beating the repeaterless bound on the bipartite private capacity.
We propose a practical conference key agreement protocol that only uses WCPs and linear optics and prove its security with a multiparty decoy-state method.
arXiv Detail & Related papers (2022-11-28T17:09:41Z) - Targeted Separation and Convergence with Kernel Discrepancies [61.973643031360254]
kernel-based discrepancy measures are required to (i) separate a target P from other probability measures or (ii) control weak convergence to P.
In this article we derive new sufficient and necessary conditions to ensure (i) and (ii)
For MMDs on separable metric spaces, we characterize those kernels that separate Bochner embeddable measures and introduce simple conditions for separating all measures with unbounded kernels.
arXiv Detail & Related papers (2022-09-26T16:41:16Z) - Conference key agreement in a quantum network [67.410870290301]
Quantum conference key agreement (QCKA) allows multiple users to establish a secure key from a shared multi-partite entangled state.
In a quantum network, this protocol can be efficiently implemented using a single copy of a N-qubit Greenberger-Horne-Zeilinger (GHZ) state to distil a secure N-user conference key bit.
arXiv Detail & Related papers (2022-07-04T18:00:07Z) - Multipartite Intrinsic Non-Locality and Device-Independent Conference Key Agreement [3.187381965457262]
We introduce multipartite intrinsic non-locality as a method for quantifying resources in the multipartite scenario of device-independent (DI) conference key agreement.
We prove that multipartite intrinsic non-locality is additive, convex, and monotone under a class of free operations called local operations and common randomness.
arXiv Detail & Related papers (2021-11-04T02:42:36Z) - Upper bounds on device-independent quantum key distribution rates in
static and dynamic scenarios [3.3399953831968334]
We develop upper bounds for key rates for device-independent quantum key distribution (DI-QKD) protocols and devices.
We show that the convex hull of the currently known bounds is a tighter upper bound on the device-independent key rates of standard CHSH-based protocol.
We show that the device-independent private capacity for the CHSH based protocols on depolarizing and erasure channels is limited by the secret key capacity of dephasing channels.
arXiv Detail & Related papers (2021-07-13T22:01:09Z) - Entanglement purification by counting and locating errors with
entangling measurements [62.997667081978825]
We consider entanglement purification protocols for multiple copies of qubit states.
We use high-dimensional auxiliary entangled systems to learn about number and positions of errors in the noisy ensemble.
arXiv Detail & Related papers (2020-11-13T19:02:33Z) - Entropy bounds for multiparty device-independent cryptography [0.0]
We show that genuine multipartite entanglement is necessary to certify the privacy of a party's outcome.
We obtain the entropy bounds thanks to two general results of independent interest.
arXiv Detail & Related papers (2020-04-29T15:22:57Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.