A simple relation of guessing probability in quantum key distribution
- URL: http://arxiv.org/abs/2112.11783v6
- Date: Fri, 26 Aug 2022 09:43:19 GMT
- Title: A simple relation of guessing probability in quantum key distribution
- Authors: Hong-Yi Su
- Abstract summary: The receiver-eavesdropper similarity implies a simple relation in terms of guessing probability and correctness of sifted keys.
The regions of error rates determined by such a guessing-probability-based relation are shown to be close to those determined by security criteria.
- Score: 0.45687771576879593
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Given a communication system using quantum key distribution, the receiver can
be seen as one who tries to guess the sender's information just as potential
eavesdroppers do. The receiver-eavesdropper similarity thus implies a simple
relation in terms of guessing probability and correctness of sifted keys,
related with the distance-based, information-theoretic security. The tolerable
regions of error rates determined by such a guessing-probability-based relation
are shown to be close to those determined by security criteria. Thus, an
alternative perspective on applying guessing probability in analyzing quantum
key distribution issues is here provided. Examples of two specific protocols
are illustrated. Our results contribute to evaluating an important element in
communication study, and may provide useful reference for the security analysis
of quantum key distribution protocols.
Related papers
- Orthogonal-state-based Measurement Device Independent Quantum Communication [32.244698777387995]
We propose a new protocol of measurement-device-independent quantum secure direct communication and quantum dialogue employing single basis, i.e., Bell basis as decoy qubits for eavesdropping detection.
Our protocols leverage fundamentally distinct resources to close the security loopholes linked to measurement devices, while also effectively doubling the distance for secure direct message transmission.
arXiv Detail & Related papers (2024-09-30T15:57:17Z) - Twin-field-based multi-party quantum key agreement [0.0]
We study a method to extend the twin-field key distribution protocol to a scheme for multi-party quantum key agreement.
We derive the key rate based on the entanglement-based source-replacement scheme.
arXiv Detail & Related papers (2024-09-06T11:51:10Z) - Complete security analysis of {quantum key distribution} based on
unified model of sequential discrimination strategy [0.0]
We propose a unified model of sequential discrimination including an eavesdropper.
We obtain a non-zero secret key rate between the sender and receiver, which implies that the sender and receiver can share a secret key despite eavesdropping.
arXiv Detail & Related papers (2023-09-26T07:23:34Z) - Semi-device independent nonlocality certification for near-term quantum
networks [46.37108901286964]
Bell tests are the most rigorous method for verifying entanglement in quantum networks.
If there is any signaling between the parties, then the violation of Bell inequalities can no longer be used.
We propose a semi-device independent protocol that allows us to numerically correct for effects of correlations in experimental probability distributions.
arXiv Detail & Related papers (2023-05-23T14:39:08Z) - Upper bounds on key rates in device-independent quantum key distribution
based on convex-combination attacks [1.118478900782898]
We present the convex-combination attack as an efficient, easy-to-use technique for upper-bounding DIQKD key rates.
It allows verifying the accuracy of lower bounds on key rates for state-of-the-art protocols.
arXiv Detail & Related papers (2022-06-13T15:27:48Z) - Distribution Regression with Sliced Wasserstein Kernels [45.916342378789174]
We propose the first OT-based estimator for distribution regression.
We study the theoretical properties of a kernel ridge regression estimator based on such representation.
arXiv Detail & Related papers (2022-02-08T15:21:56Z) - Transfer Learning in Quantum Parametric Classifiers: An
Information-Theoretic Generalization Analysis [42.275148861039895]
A key step in quantum machine learning with classical inputs is the design of an embedding circuit mapping inputs to a quantum state.
This paper studies a transfer learning setting in which classical-to-quantum embedding is carried out by an arbitrary parametric quantum circuit.
arXiv Detail & Related papers (2022-01-17T09:28:13Z) - Interactive Protocols for Classically-Verifiable Quantum Advantage [46.093185827838035]
"Interactions" between a prover and a verifier can bridge the gap between verifiability and implementation.
We demonstrate the first implementation of an interactive quantum advantage protocol, using an ion trap quantum computer.
arXiv Detail & Related papers (2021-12-09T19:00:00Z) - Secure communication over generalised quantum multiple access channels [1.251280464827565]
We provide the formula for the achievable rate region of secure communication in the scenario of two senders and a single receiver.
We explicitly specify a protocol for secure communication in this scenario, which employs superdense coding.
We prove the security of the protocol against general quantum attacks, analyze different strategies of the eavesdropper and compute the key rate for a range of noisy quantum channels.
arXiv Detail & Related papers (2021-06-24T20:40:12Z) - Shannon theory for quantum systems and beyond: information compression
for fermions [68.8204255655161]
We show that entanglement fidelity in the fermionic case is capable of evaluating the preservation of correlations.
We introduce a fermionic version of the source coding theorem showing that, as in the quantum case, the von Neumann entropy is the minimal rate for which a fermionic compression scheme exists.
arXiv Detail & Related papers (2021-06-09T10:19:18Z) - Bell nonlocality is not sufficient for the security of standard
device-independent quantum key distribution protocols [1.9573380763700712]
Device-independent quantum key distribution is a secure quantum cryptographic paradigm that allows two honest users to establish a secret key.
We show that no protocol of this form allows for establishing a secret key when implemented on any correlation obtained by measuring local projective measurements.
arXiv Detail & Related papers (2021-03-03T19:10:06Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.