Quantum key distribution using single photon added-subtracted squeezed
coherent state
- URL: http://arxiv.org/abs/2208.12877v1
- Date: Fri, 26 Aug 2022 22:07:39 GMT
- Title: Quantum key distribution using single photon added-subtracted squeezed
coherent state
- Authors: Youssef Oulouda, Mohamed El Falaki, Mohamed Daoud
- Abstract summary: In paper we investigate the security of continuous variable BB84 key distribution protocol.
Our analysis employs quantum rate, bit rate, and mutual information.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: In this paper we investigate the security of continuous variable BB84 quantum
key distribution protocol using single photon added then subtracted squeezed
coherent state SPASSCS. It's found that the SPASSCS is a non-Gaussian and
nonclassical state. Its non-Gaussianity and non-classicality are exhibited via
the Wigner function. It's shown that the proposed state is generally robust
against the eavesdropping strategies, such as intercept-resend attack and
superior channel attack. Further, a comparative study has proved the strong
efficiency of the proposed state over coherent state, squeezed coherent state
and photon added then subtracted coherent state. Our analysis employs bit error
rate, mutual information, and secure key gain.
Related papers
- Secure quantum imaging with decoy state heralded single photons [0.0]
We study quantum secured imaging with the decoy state heralded single photon source (HSPS)
The HSPSs superior performance in low photon number regimes makes it an ideal candidate for integrating quantum key distribution protocols.
arXiv Detail & Related papers (2024-02-18T18:43:05Z) - Security of a Continuous-Variable based Quantum Position Verification
Protocol [0.0]
We present and analyze a protocol that utilizes coherent states and its properties.
We prove security of the protocol against any unentangled attackers via entropic uncertainty relations.
We show that attackers who pre-share one continuous-variable EPR pair can break the protocol.
arXiv Detail & Related papers (2023-08-08T09:56:38Z) - Neural-network quantum states for ultra-cold Fermi gases [49.725105678823915]
This work introduces a novel Pfaffian-Jastrow neural-network quantum state that includes backflow transformation based on message-passing architecture.
We observe the emergence of strong pairing correlations through the opposite-spin pair distribution functions.
Our findings suggest that neural-network quantum states provide a promising strategy for studying ultra-cold Fermi gases.
arXiv Detail & Related papers (2023-05-15T17:46:09Z) - A Variational Quantum Attack for AES-like Symmetric Cryptography [69.80357450216633]
We propose a variational quantum attack algorithm (VQAA) for classical AES-like symmetric cryptography.
In the VQAA, the known ciphertext is encoded as the ground state of a Hamiltonian that is constructed through a regular graph.
arXiv Detail & Related papers (2022-05-07T03:15:15Z) - Deterministic Gaussian conversion protocols for non-Gaussian single-mode
resources [58.720142291102135]
We show that cat and binomial states are approximately equivalent for finite energy, while this equivalence was previously known only in the infinite-energy limit.
We also consider the generation of cat states from photon-added and photon-subtracted squeezed states, improving over known schemes by introducing additional squeezing operations.
arXiv Detail & Related papers (2022-04-07T11:49:54Z) - Performance analysis of continuous-variable quantum key distribution
using non-Gaussian states [0.0]
In this study, we analyze the efficiency of a protocol with discrete modulation of continuous variable non-Gaussian states.
We calculate the secure key generation rate against collective attacks using the fact that Eve's information can be bounded based on the protocol.
arXiv Detail & Related papers (2021-12-19T11:55:17Z) - Shannon theory for quantum systems and beyond: information compression
for fermions [68.8204255655161]
We show that entanglement fidelity in the fermionic case is capable of evaluating the preservation of correlations.
We introduce a fermionic version of the source coding theorem showing that, as in the quantum case, the von Neumann entropy is the minimal rate for which a fermionic compression scheme exists.
arXiv Detail & Related papers (2021-06-09T10:19:18Z) - Security of the decoy state method for quantum key distribution [0.0]
Quantum cryptography or, more precisely, quantum key distribution (QKD) is one of the advanced areas in the field of quantum technologies.
This paper is devoted to the decoy state method, a countermeasure against vulnerabilities caused by the use of coherent states of light for QKD protocols.
arXiv Detail & Related papers (2021-01-25T14:33:04Z) - Photon-added coherent states using the continuous-mode formalism [0.0]
The squeezed nature of photon-added coherent (PAC) states potentially offers an advantage in quantum sensing applications.
We study the properties of a single-photon and coherent state wavepacket superimposed with variable temporal and spectral overlap.
We show that, even without perfect overlap, the state exhibits a sub-Poissonian number distribution, second-order quantum correlations and quadrature squeezing for a weak coherent state.
arXiv Detail & Related papers (2020-10-22T16:32:18Z) - Gaussian conversion protocols for cubic phase state generation [104.23865519192793]
Universal quantum computing with continuous variables requires non-Gaussian resources.
The cubic phase state is a non-Gaussian state whose experimental implementation has so far remained elusive.
We introduce two protocols that allow for the conversion of a non-Gaussian state to a cubic phase state.
arXiv Detail & Related papers (2020-07-07T09:19:49Z) - Einselection from incompatible decoherence channels [62.997667081978825]
We analyze an open quantum dynamics inspired by CQED experiments with two non-commuting Lindblad operators.
We show that Fock states remain the most robust states to decoherence up to a critical coupling.
arXiv Detail & Related papers (2020-01-29T14:15:19Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.