Finite-Key Analysis of Quantum Key Distribution with Characterized
Devices Using Entropy Accumulation
- URL: http://arxiv.org/abs/2203.06554v1
- Date: Sun, 13 Mar 2022 03:00:41 GMT
- Title: Finite-Key Analysis of Quantum Key Distribution with Characterized
Devices Using Entropy Accumulation
- Authors: Ian George, Jie Lin, Thomas van Himbeeck, Kun Fang, Norbert
L\"utkenhaus
- Abstract summary: The Entropy Accumulation Theorem (EAT) was introduced to significantly improve the finite-size rates for device-independent quantum information processing tasks.
We present new tools for applying the EAT in the device-dependent setting.
- Score: 9.316071675613738
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: The Entropy Accumulation Theorem (EAT) was introduced to significantly
improve the finite-size rates for device-independent quantum information
processing tasks such as device-independent quantum key distribution (QKD). A
natural question would be whether it also improves the rates for
device-dependent QKD. In this work, we provide an affirmative answer to this
question. We present new tools for applying the EAT in the device-dependent
setting. We present sufficient conditions for the Markov chain conditions to
hold as well as general algorithms for constructing the needed min-tradeoff
function. Utilizing Dupuis' recent privacy amplification without smoothing
result, we improve the key rate by optimizing the sandwiched R\'{e}nyi entropy
directly rather than considering the traditional smooth min-entropy. We
exemplify these new tools by considering several examples including the BB84
protocol with the qubit-based version and with a realistic parametric
downconversion source, the six-state four-state protocol and a high-dimensional
analog of the BB84 protocol.
Related papers
- Improved finite-size key rates for discrete-modulated continuous variable quantum key distribution under coherent attacks [0.0]
We consider a prepare-and-measure CVQKD protocol, where Alice chooses from a set of four coherent states and Bob performs a heterodyne measurement.
We provide a security proof against coherent attacks in the finite-size regime, and compute the achievable key rate.
arXiv Detail & Related papers (2024-07-03T13:18:31Z) - Real-time error mitigation for variational optimization on quantum
hardware [45.935798913942904]
We define a Real Time Quantum Error Mitigation (RTQEM) algorithm to assist in fitting functions on quantum chips with VQCs.
Our RTQEM routine can enhance VQCs' trainability by reducing the corruption of the loss function.
arXiv Detail & Related papers (2023-11-09T19:00:01Z) - Distribution-Flexible Subset Quantization for Post-Quantizing
Super-Resolution Networks [68.83451203841624]
This paper introduces Distribution-Flexible Subset Quantization (DFSQ), a post-training quantization method for super-resolution networks.
DFSQ conducts channel-wise normalization of the activations and applies distribution-flexible subset quantization (SQ)
It achieves comparable performance to full-precision counterparts on 6- and 8-bit quantization, and incurs only a 0.1 dB PSNR drop on 4-bit quantization.
arXiv Detail & Related papers (2023-05-10T04:19:11Z) - Solving Oscillation Problem in Post-Training Quantization Through a
Theoretical Perspective [74.48124653728422]
Post-training quantization (PTQ) is widely regarded as one of the most efficient compression methods practically.
We argue that an overlooked problem of oscillation is in the PTQ methods.
arXiv Detail & Related papers (2023-03-21T14:52:52Z) - End-to-end resource analysis for quantum interior point methods and portfolio optimization [63.4863637315163]
We provide a complete quantum circuit-level description of the algorithm from problem input to problem output.
We report the number of logical qubits and the quantity/depth of non-Clifford T-gates needed to run the algorithm.
arXiv Detail & Related papers (2022-11-22T18:54:48Z) - Quantum key distribution rates from semidefinite programming [0.0]
We introduce an efficient algorithm for computing the key rate in quantum key distribution protocols.
The resulting algorithm is easy to implement and easy to use.
We use it to reanalyse experimental data to demonstrate how higher key rates can be achieved.
arXiv Detail & Related papers (2022-11-10T17:47:37Z) - Data post-processing for the one-way heterodyne protocol under
composable finite-size security [62.997667081978825]
We study the performance of a practical continuous-variable (CV) quantum key distribution protocol.
We focus on the Gaussian-modulated coherent-state protocol with heterodyne detection in a high signal-to-noise ratio regime.
This allows us to study the performance for practical implementations of the protocol and optimize the parameters connected to the steps above.
arXiv Detail & Related papers (2022-05-20T12:37:09Z) - Numerical Security Proof for Decoy-State BB84 and
Measurement-Device-Independent QKD Resistant against Large Basis Misalignment [3.5027291542274357]
We incorporate decoy-state analysis into a well-established numerical framework for key rate calculation.
We apply the numerical framework to decoy-state BB84 and measurement-device-independent (MDI) QKD protocols as examples.
We show that such variations can grant protocols resilience against any unknown and slowly changing rotation along one axis.
arXiv Detail & Related papers (2021-08-24T17:11:06Z) - Simple and practical DIQKD security analysis via BB84-type uncertainty
relations and Pauli correlation constraints [0.0]
In this work, we describe how the conditional entropy can be bounded in the 2-input/2-output setting.
We illustrate the approach on a variant of the device-independent CHSH QKD protocol where both bases are used to generate the key.
arXiv Detail & Related papers (2021-07-19T14:08:43Z) - Composably secure data processing for Gaussian-modulated continuous
variable quantum key distribution [58.720142291102135]
Continuous-variable quantum key distribution (QKD) employs the quadratures of a bosonic mode to establish a secret key between two remote parties.
We consider a protocol with homodyne detection in the general setting of composable finite-size security.
In particular, we analyze the high signal-to-noise regime which requires the use of high-rate (non-binary) low-density parity check codes.
arXiv Detail & Related papers (2021-03-30T18:02:55Z) - Computing conditional entropies for quantum correlations [10.549307055348596]
In particular, we find new upper bounds on the minimal global detection efficiency required to perform device-independent quantum key distribution.
We introduce the family of iterated mean quantum R'enyi divergences with parameters $alpha_k = 1+frac12k-1$ for positive integers $k$.
We show that the corresponding conditional entropies admit a particularly nice form which, in the context of device-independent optimization, can be relaxed to a semidefinite programming problem.
arXiv Detail & Related papers (2020-07-24T15:27:51Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.