Dead-time optimization to increase secure distance range in prepare and
measure quantum key distribution protocols
- URL: http://arxiv.org/abs/2303.13742v1
- Date: Fri, 24 Mar 2023 01:50:24 GMT
- Title: Dead-time optimization to increase secure distance range in prepare and
measure quantum key distribution protocols
- Authors: Carlos Wiechers, J.L. Lucio, X\'ochitl S\'anchez-Lozano, Rafael
G\'omez-Medina, Mariana Salado-Mej\'ia
- Abstract summary: We introduce an effective analytic model, including dead-time and afterpulsing corrections.
This model is useful to evaluate the performance of prepare and measure quantum key distribution protocols.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Afterpulsing is a factor limiting the distance over which discrete-variable
quantum key distribution systems are secure, and a common feature in
single-photon detectors. The relevance of this phenomenon stems from its
stochastic, self-interacting nature and the fact that its rate rises with the
number of avalanche events, which increases the quantum bit error rate. Here we
introduce an effective analytic model, including dead-time and afterpulsing
corrections, where afterpulsing correction depends on dead-time value. This
model is useful to evaluate the performance of prepare and measure quantum key
distribution protocols (standard and decoy versions) that use gated single
photon detectors. The model provides an expression to numerically optimize the
secret key rate over the full distance range for secure communication, enabling
in this way the calculation of quantum bit error rate and secure key rate. In
the conventional procedure, the dead-time value is fixed regardless of
distance, limiting the distance range of the channel due to remaining
afterpulsing effects, which are more relevant at higher operating frequencies.
Here we demonstrate that optimizing the dead-time values increases the distance
range of the channel to share secret keys.
Related papers
- Relaxed Quantile Regression: Prediction Intervals for Asymmetric Noise [51.87307904567702]
Quantile regression is a leading approach for obtaining such intervals via the empirical estimation of quantiles in the distribution of outputs.
We propose Relaxed Quantile Regression (RQR), a direct alternative to quantile regression based interval construction that removes this arbitrary constraint.
We demonstrate that this added flexibility results in intervals with an improvement in desirable qualities.
arXiv Detail & Related papers (2024-06-05T13:36:38Z) - Near-Term Distributed Quantum Computation using Mean-Field Corrections
and Auxiliary Qubits [77.04894470683776]
We propose near-term distributed quantum computing that involve limited information transfer and conservative entanglement production.
We build upon these concepts to produce an approximate circuit-cutting technique for the fragmented pre-training of variational quantum algorithms.
arXiv Detail & Related papers (2023-09-11T18:00:00Z) - Importance sampling for stochastic quantum simulations [68.8204255655161]
We introduce the qDrift protocol, which builds random product formulas by sampling from the Hamiltonian according to the coefficients.
We show that the simulation cost can be reduced while achieving the same accuracy, by considering the individual simulation cost during the sampling stage.
Results are confirmed by numerical simulations performed on a lattice nuclear effective field theory.
arXiv Detail & Related papers (2022-12-12T15:06:32Z) - Data post-processing for the one-way heterodyne protocol under
composable finite-size security [62.997667081978825]
We study the performance of a practical continuous-variable (CV) quantum key distribution protocol.
We focus on the Gaussian-modulated coherent-state protocol with heterodyne detection in a high signal-to-noise ratio regime.
This allows us to study the performance for practical implementations of the protocol and optimize the parameters connected to the steps above.
arXiv Detail & Related papers (2022-05-20T12:37:09Z) - Quantum key distribution surpassing the repeaterless rate-transmittance
bound without global phase locking [0.5857929080874287]
We propose a mode-pairing measurement-device-independent quantum key distribution scheme.
It can achieve a key rate of $R=O(sqrteta)$ without global phase locking when the local phase fluctuation is mild.
arXiv Detail & Related papers (2022-01-12T05:10:19Z) - Frequency multiplexed entanglement for continuous-variable quantum key
distribution [0.0]
Quantum key distribution with continuous variables already uses advantageous high-speed single-mode homodyne detection with low electronic noise at room temperature.
The distance for secure key transmission through lossy channels can approach 300 km in current optical fibers.
We demonstrate the positive outcome of this methodology on the experimentally characterized frequency-multiplexed entangled source of femtosecond optical pulses.
arXiv Detail & Related papers (2021-10-27T15:18:16Z) - Accurate methods for the analysis of strong-drive effects in parametric
gates [94.70553167084388]
We show how to efficiently extract gate parameters using exact numerics and a perturbative analytical approach.
We identify optimal regimes of operation for different types of gates including $i$SWAP, controlled-Z, and CNOT.
arXiv Detail & Related papers (2021-07-06T02:02:54Z) - Composably secure data processing for Gaussian-modulated continuous
variable quantum key distribution [58.720142291102135]
Continuous-variable quantum key distribution (QKD) employs the quadratures of a bosonic mode to establish a secret key between two remote parties.
We consider a protocol with homodyne detection in the general setting of composable finite-size security.
In particular, we analyze the high signal-to-noise regime which requires the use of high-rate (non-binary) low-density parity check codes.
arXiv Detail & Related papers (2021-03-30T18:02:55Z) - Finite-key analysis for memory-assisted decoy-state quantum key
distribution [1.218340575383456]
Memory-assisted quantum key distribution (MA-QKD) systems are among novel promising solutions.
We show that accounting for finite-key effects would actually favour MA-QKD setups.
arXiv Detail & Related papers (2020-05-09T13:02:09Z) - Tight security bounds for decoy-state quantum key distribution [1.1563829079760959]
The BB84 quantum key distribution (QKD) combined with decoy-state method is currently the most practical protocol.
Here, we provide the rigorous and optimal analytic formula to solve the above tasks.
Our results can be widely applied to deal with statistical fluctuation in quantum cryptography protocols.
arXiv Detail & Related papers (2020-02-16T07:48:25Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.