The Quantum Chernoff Divergence in Advantage Distillation for QKD and
DIQKD
- URL: http://arxiv.org/abs/2212.06975v2
- Date: Wed, 21 Dec 2022 01:15:39 GMT
- Title: The Quantum Chernoff Divergence in Advantage Distillation for QKD and
DIQKD
- Authors: Mikka Stasiuk, Norbert L\"utkenhaus, Ernest Y.-Z. Tan
- Abstract summary: Device-independent quantum key distribution (DIQKD) aims to mitigate adversarial exploitation of imperfections in quantum devices.
We present an alternative proof structure that replaces the fidelity with the quantum Chernoff divergence.
Our results provide insight into a fundamental question in quantum information theory regarding the circumstances under which DIQKD is possible.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Device-independent quantum key distribution (DIQKD) aims to mitigate
adversarial exploitation of imperfections in quantum devices, by providing an
approach for secret key distillation with modest security assumptions.
Advantage distillation, a two-way communication procedure in error correction,
has proven effective in raising noise tolerances in both device-dependent and
device-independent QKD. Previously, device-independent security proofs against
IID collective attacks were developed for an advantage distillation protocol
known as the repetition-code protocol, based on security conditions involving
the fidelity between some states in the protocol. However, there exists a gap
between the sufficient and necessary security conditions, which hinders the
calculation of tight noise-tolerance bounds based on the fidelity. We close
this gap by presenting an alternative proof structure that replaces the
fidelity with the quantum Chernoff divergence, a distinguishability measure
that arises in symmetric hypothesis testing. Working in the IID collective
attacks model, we derive matching sufficient and necessary conditions for the
repetition-code protocol to be secure (up to a natural conjecture regarding the
latter case) in terms of the quantum Chernoff divergence, hence indicating that
this serves as the relevant quantity of interest for this protocol.
Furthermore, using this security condition we obtain some improvements over
previous results on the noise tolerance thresholds for DIQKD. Our results
provide insight into a fundamental question in quantum information theory
regarding the circumstances under which DIQKD is possible.
Related papers
- One-sided DI-QKD secure against coherent attacks over long distances [0.0]
Device-Independent (DI) QKD protocols overcome this issue by making minimal device assumptions.
We show that a one-sided DI QKD scheme with two measurements per party is secure against coherent attacks up to detection efficiencies greater than 50.1% specifically on the untrusted side.
We also show that, by placing the source of states close to the untrusted side, our protocol is secure over distances comparable to standard QKD protocols.
arXiv Detail & Related papers (2024-03-18T15:01:17Z) - Security Assumptions in Dispersive-Optics QKD [3.249879651054463]
Quantum key distribution (QKD) seeks to provide a method of generating cryptographically-secure keys between remote parties.
We provide examples where a significant gap exists between the Holevo information, and therefore the secret key rate, predicted by two models.
arXiv Detail & Related papers (2024-03-13T23:14:49Z) - Empirical Risk-aware Machine Learning on Trojan-Horse Detection for Trusted Quantum Key Distribution Networks [31.857236131842843]
Quantum key distribution (QKD) is a cryptographic technique that offers high levels of data security during transmission.
The existence of a gap between theoretical concepts and practical implementation has raised concerns about the trustworthiness of QKD networks.
We propose the implementation of risk-aware machine learning techniques that present risk analysis for Trojan-horse attacks over the time-variant quantum channel.
arXiv Detail & Related papers (2024-01-26T03:36:13Z) - Finite-Key Analysis for Coherent One-Way Quantum Key Distribution [18.15943439545963]
Coherent-one-way (COW) quantum key distribution (QKD) is a significant communication protocol that has been implemented experimentally and deployed in practical products.
Existing security analyses of COW-QKD either provide a short transmission distance or lack immunity against coherent attacks in the finite-key regime.
We present a tight finite-key framework for a variant of COW-QKD, which has been proven to extend the secure transmission distance in the case.
arXiv Detail & Related papers (2023-09-28T03:32:06Z) - Semi-device independent nonlocality certification for near-term quantum
networks [46.37108901286964]
Bell tests are the most rigorous method for verifying entanglement in quantum networks.
If there is any signaling between the parties, then the violation of Bell inequalities can no longer be used.
We propose a semi-device independent protocol that allows us to numerically correct for effects of correlations in experimental probability distributions.
arXiv Detail & Related papers (2023-05-23T14:39:08Z) - Reliable Quantum Communications based on Asymmetry in Distillation and Coding [35.693513369212646]
We address the problem of reliable provision of entangled qubits in quantum computing schemes.
We combine indirect transmission based on teleportation and distillation; (2) direct transmission, based on quantum error correction (QEC)
Our results show that ad-hoc asymmetric codes give, compared to conventional QEC, a performance boost and codeword size reduction both in a single link and in a quantum network scenario.
arXiv Detail & Related papers (2023-05-01T17:13:23Z) - Experimental measurement-device-independent type quantum key
distribution with flawed and correlated sources [14.143874849657317]
Security of quantum key distribution (QKD) is threatened by discrepancies between realistic devices and theoretical assumptions.
Here, we adopt the reference technique to prove security of an efficient four-phase measurement-device-independent QKD using laser pulses against potential source imperfections.
In addition, we demonstrate the feasibility of our protocol through a proof-of-principle experimental implementation and achieve a secure key rate of 253 bps with a 20 dB channel loss.
arXiv Detail & Related papers (2022-04-18T13:44:51Z) - Quantum Proofs of Deletion for Learning with Errors [91.3755431537592]
We construct the first fully homomorphic encryption scheme with certified deletion.
Our main technical ingredient is an interactive protocol by which a quantum prover can convince a classical verifier that a sample from the Learning with Errors distribution in the form of a quantum state was deleted.
arXiv Detail & Related papers (2022-03-03T10:07:32Z) - Shannon theory for quantum systems and beyond: information compression
for fermions [68.8204255655161]
We show that entanglement fidelity in the fermionic case is capable of evaluating the preservation of correlations.
We introduce a fermionic version of the source coding theorem showing that, as in the quantum case, the von Neumann entropy is the minimal rate for which a fermionic compression scheme exists.
arXiv Detail & Related papers (2021-06-09T10:19:18Z) - Fidelity Bounds for Device-Independent Advantage Distillation [0.0]
We develop an algorithm that returns arbitrarily tight lower bounds on the fidelity of a device-independent repetition-code protocol.
Our results give new insight on how strong the fidelity-related security conditions are, and could also be used to compute some lower bounds on one-way protocol keyrates.
arXiv Detail & Related papers (2021-05-07T12:37:01Z) - Round-robin differential phase-time-shifting protocol for quantum key
distribution: theory and experiment [58.03659958248968]
Quantum key distribution (QKD) allows the establishment of common cryptographic keys among distant parties.
Recently, a QKD protocol that circumvents the need for monitoring signal disturbance, has been proposed and demonstrated in initial experiments.
We derive the security proofs of the round-robin differential phase-time-shifting protocol in the collective attack scenario.
Our results show that the RRDPTS protocol can achieve higher secret key rate in comparison with the RRDPS, in the condition of high quantum bit error rate.
arXiv Detail & Related papers (2021-03-15T15:20:09Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.