New protocols for quantum key distribution with explicit upper and lower
bound on secret-key rate
- URL: http://arxiv.org/abs/2212.13089v2
- Date: Wed, 27 Sep 2023 02:23:27 GMT
- Title: New protocols for quantum key distribution with explicit upper and lower
bound on secret-key rate
- Authors: Arindam Dutta and Anirban Pathak
- Abstract summary: We present two new schemes for quantum key distribution (QKD) which neither require entanglement nor require an ideal single photon source.
The proposed protocols can be implemented using realistic single photon sources which are commercially available.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Here we present two new schemes for quantum key distribution (QKD) which
neither require entanglement nor require an ideal single photon source. Thus,
the proposed protocols can be implemented using realistic single photon sources
which are commercially available. The schemes are shown to be secure against
multiple attacks (e.g., intercept resend attack and a class of collective
attacks). Bounds on the key rate are obtained and it is shown that by applying
a certain type of classical pre-processing, the tolerable error limit can be
increased. A trade-off between quantum resources used and information revealed
to Eve is observed and it is shown that by using slightly more quantum
resources it is possible to design protocols having higher efficiency compared
to a protocol of the same family that uses relatively lesser amount of quantum
resources. Specifically, in our case, SARG04 protocol is a protocol of the same
family and it is clearly shown that the proposed protocols can provide higher
efficiency compared to SARG04 at the cost of consumption of more quantum
resources. Further, it is shown that the critical distances for the proposed
protocols under photon number splitting (PNS) type attacks are higher than the
critical distances obtained for BB84 and SARG04 protocols implemented under
similar situation.
Related papers
- Single-Round Proofs of Quantumness from Knowledge Assumptions [41.94295877935867]
A proof of quantumness is an efficiently verifiable interactive test that an efficient quantum computer can pass.
Existing single-round protocols require large quantum circuits, whereas multi-round ones use smaller circuits but require experimentally challenging mid-circuit measurements.
We construct efficient single-round proofs of quantumness based on existing knowledge assumptions.
arXiv Detail & Related papers (2024-05-24T17:33:10Z) - Efficient Device-Independent Quantum Key Distribution [4.817429789586127]
Device-independent quantum key distribution (DIQKD) is a key distribution scheme whose security is based on the laws of quantum physics.
We propose an efficient device-independent quantum key distribution protocol in which one participant prepares states and transmits them to another participant.
arXiv Detail & Related papers (2023-11-16T13:01:34Z) - Collective attack free controlled quantum key agreement without quantum
memory [0.0]
We present a new protocol for controlled quantum key agreement and another protocol for key agreement with a specific focus on the security analysis.
Specifically, detailed security proof is provided against impersonated fraudulent attack and collective attacks.
arXiv Detail & Related papers (2023-08-10T09:51:23Z) - Boosted quantum and semi-quantum communication protocols [0.0]
We show that it is possible to reduce the number of such runs by a suitable design of the key generation rule.
We illustrate this advantage by proposing quantum and semi-quantum key distribution protocols.
arXiv Detail & Related papers (2023-03-24T12:33:22Z) - Multi-User Entanglement Distribution in Quantum Networks Using Multipath
Routing [55.2480439325792]
We propose three protocols that increase the entanglement rate of multi-user applications by leveraging multipath routing.
The protocols are evaluated on quantum networks with NISQ constraints, including limited quantum memories and probabilistic entanglement generation.
arXiv Detail & Related papers (2023-03-06T18:06:00Z) - Conference key agreement in a quantum network [67.410870290301]
Quantum conference key agreement (QCKA) allows multiple users to establish a secure key from a shared multi-partite entangled state.
In a quantum network, this protocol can be efficiently implemented using a single copy of a N-qubit Greenberger-Horne-Zeilinger (GHZ) state to distil a secure N-user conference key bit.
arXiv Detail & Related papers (2022-07-04T18:00:07Z) - Data post-processing for the one-way heterodyne protocol under
composable finite-size security [62.997667081978825]
We study the performance of a practical continuous-variable (CV) quantum key distribution protocol.
We focus on the Gaussian-modulated coherent-state protocol with heterodyne detection in a high signal-to-noise ratio regime.
This allows us to study the performance for practical implementations of the protocol and optimize the parameters connected to the steps above.
arXiv Detail & Related papers (2022-05-20T12:37:09Z) - Composably secure data processing for Gaussian-modulated continuous
variable quantum key distribution [58.720142291102135]
Continuous-variable quantum key distribution (QKD) employs the quadratures of a bosonic mode to establish a secret key between two remote parties.
We consider a protocol with homodyne detection in the general setting of composable finite-size security.
In particular, we analyze the high signal-to-noise regime which requires the use of high-rate (non-binary) low-density parity check codes.
arXiv Detail & Related papers (2021-03-30T18:02:55Z) - Round-robin differential phase-time-shifting protocol for quantum key
distribution: theory and experiment [58.03659958248968]
Quantum key distribution (QKD) allows the establishment of common cryptographic keys among distant parties.
Recently, a QKD protocol that circumvents the need for monitoring signal disturbance, has been proposed and demonstrated in initial experiments.
We derive the security proofs of the round-robin differential phase-time-shifting protocol in the collective attack scenario.
Our results show that the RRDPTS protocol can achieve higher secret key rate in comparison with the RRDPS, in the condition of high quantum bit error rate.
arXiv Detail & Related papers (2021-03-15T15:20:09Z) - Measure-resend authenticated semi-quantum key distribution with single
photons [5.594785248905853]
A new measure-resend ASQKD protocol is proposed in this paper.
The security proof shows the robustness of the proposed protocol under the collective attack.
arXiv Detail & Related papers (2020-06-20T05:03:07Z) - Client-Server Identification Protocols with Quantum PUF [1.4174475093445233]
We propose two identification protocols based on the emerging hardware secure solutions, the quantum Physical Unclonable Functions (qPUFs)
The first protocol allows a low-resource party to prove its identity to a high-resource party and in the second protocol, it is vice-versa.
Unlike existing identification protocols based on Quantum Read-out PUFs which rely on the security against a specific family of attacks, our protocols provide provable exponential security against any Quantum Polynomial-Time adversary with resource-efficient parties.
arXiv Detail & Related papers (2020-06-08T12:35:09Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.