Entanglement Model for Mode-Pairing Quantum Key Distribution
- URL: http://arxiv.org/abs/2304.09621v2
- Date: Tue, 13 May 2025 13:16:39 GMT
- Title: Entanglement Model for Mode-Pairing Quantum Key Distribution
- Authors: Yi-Fei Lu, Yang Wang, Hong-Wei Li, Mu-Sheng Jiang, Xiao-Xu Zhang, Ying-Ying Zhang, Yu Zhou, Xiao-Lei Jiang, Hai-Tao Wang, Yan-Mei Zhao, Chun Zhou, Wan-Su Bao,
- Abstract summary: Mode-pairing (MP) quantum key distribution (QKD) eliminates the requirements of phase locking and phase tracking.<n>We present an entanglement model for MP-QKD by proposing a free-pairing entanglement scheme that is equivalent to MP-QKD.
- Score: 14.368975476751435
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Mode-pairing (MP) quantum key distribution (QKD) eliminates the requirements of phase locking and phase tracking compared with twin-field (TF) QKD while still surpassing the fundamental rate-distance limit of QKD. The complexity of the experimental implementation is reduced while the efficiency can still be guaranteed. In MP-QKD, two communication parties need to pair two effective rounds according to the announced results by the third party. Therefore, it is not intuitive how to provide an entanglement protocol equivalent to the prepare-and-measure protocol for proving security. At present, the security of MP-QKD is rigorously proven by examining the consistency of the states detailly between MP-QKD and the fixed-pairing scheme under all of Eve's possible interference to obtain the equivalence, and verifying the security of the latter. Here, we directly present an entanglement model for MP-QKD by proposing a free-pairing entanglement scheme that is equivalent to MP-QKD. This entanglement model simplifies the security proof and provides a clearer insight into the foundation of MP-QKD. Besides, it could provide a theoretical framework for the comprehensive analysis of MP-QKD, such as facilitating practical security analysis. Additionally, we propose an optimized pairing strategy based on the entanglement model. The simulation results show an enhancement of 163\% in pairing efficiency with a reasonable pairing interval $2 \times 10^5$.
Related papers
- Secure quantum key distribution against correlated leakage source [20.01403427477703]
Quantum key distribution (QKD) provides information theoretic security based on quantum mechanics.<n>Among various source loopholes, correlations between transmitted pulses pose a significant yet underexplored security risk.<n>We propose a security analysis framework for QKD under correlations, enabling finite-key analysis for the first time.
arXiv Detail & Related papers (2025-07-15T12:23:24Z) - Hybrid Quantum Security for IPsec [1.8637078358591843]
This paper presents the first systematic comparison of sequential versus parallel hybrid QKD-PQC key establishment strategies for IPsec.<n>We introduce two novel approaches for incorporating QKD into Internet Key Exchange version 2 (IKEv2) with support for both ETSI GS QKD 004 stateful and ETSI GS QKD 014 stateless API specifications.<n>Our key insight is that parallel hybrid approaches eliminate the multiplicative latency penalties inherent in sequential methods mandated by RFC 9370.
arXiv Detail & Related papers (2025-07-12T13:54:04Z) - Security Analysis of Mode-Pairing Quantum Key Distribution with Flexible Pairing Strategy [13.019000484719289]
We propose an improved decoy-state MP-QKD protocol featuring a flexible and efficient pairing strategy.<n>We prove the security of the proposed scheme by presenting an entanglement model for decoy-state MP-QKD.
arXiv Detail & Related papers (2025-05-16T05:12:55Z) - High-Fidelity Coherent-One-Way QKD Simulation Framework for 6G Networks: Bridging Theory and Reality [105.73011353120471]
Quantum key distribution (QKD) has been emerged as a promising solution for guaranteeing information-theoretic security.
Due to the considerable high-cost of QKD equipment, a lack of QKD communication system design tools is challenging.
This paper introduces a QKD communication system design tool.
arXiv Detail & Related papers (2025-01-21T11:03:59Z) - Loss-tolerant quantum key distribution with detection efficiency mismatch [39.58317527488534]
We establish a security proof for the loss-tolerant P&M QKD protocol that incorporates imperfections in both the source and the detectors.
Specifically, we demonstrate the security of this scheme when the emitted states deviate from the ideal ones.
arXiv Detail & Related papers (2024-12-12T19:01:56Z) - Practical hybrid PQC-QKD protocols with enhanced security and performance [44.8840598334124]
We develop hybrid protocols by which QKD and PQC inter-operate within a joint quantum-classical network.
In particular, we consider different hybrid designs that may offer enhanced speed and/or security over the individual performance of either approach.
arXiv Detail & Related papers (2024-11-02T00:02:01Z) - Improved postselection security analysis of phase error estimation in quantum key distribution [5.084252553101737]
Quantum key distribution (QKD) enables the generation of secure keys between two distant users.
We propose a method correlating the failure probabilities of phase error estimation against collective and coherent attacks.
Our method can be applied to various QKD protocols, providing better performance compared with the traditional postselection method.
arXiv Detail & Related papers (2024-09-29T03:48:08Z) - Pessimistic Iterative Planning for Robust POMDPs [33.73695799565586]
We propose a pessimistic iterative planning (PIP) framework to compute robust memory-based POMDP policies.
Within PIP, we propose the rFSCNet algorithm, which finds an FSC through a recurrent neural network by using supervision policies optimized for the pessimistic POMDP.
In each iteration, rFSCNet finds an FSC through a recurrent neural network by using supervision policies optimized for the pessimistic POMDP.
arXiv Detail & Related papers (2024-08-16T14:25:20Z) - The Road to Near-Capacity CV-QKD Reconciliation: An FEC-Agnostic Design [53.67135680812675]
A new codeword-based QKD reconciliation scheme is proposed.
Both the authenticated classical channel (ClC) and the quantum channel (QuC) are protected by separate forward error correction (FEC) coding schemes.
The proposed system makes QKD reconciliation compatible with a wide range of FEC schemes.
arXiv Detail & Related papers (2024-03-24T14:47:08Z) - One-sided DI-QKD secure against coherent attacks over long distances [0.0]
Device-Independent (DI) QKD protocols overcome this issue by making minimal device assumptions.
We show that a one-sided DI QKD scheme with two measurements per party is secure against coherent attacks up to detection efficiencies greater than 50.1% specifically on the untrusted side.
We also show that, by placing the source of states close to the untrusted side, our protocol is secure over distances comparable to standard QKD protocols.
arXiv Detail & Related papers (2024-03-18T15:01:17Z) - Empirical Risk-aware Machine Learning on Trojan-Horse Detection for Trusted Quantum Key Distribution Networks [31.857236131842843]
Quantum key distribution (QKD) is a cryptographic technique that offers high levels of data security during transmission.
The existence of a gap between theoretical concepts and practical implementation has raised concerns about the trustworthiness of QKD networks.
We propose the implementation of risk-aware machine learning techniques that present risk analysis for Trojan-horse attacks over the time-variant quantum channel.
arXiv Detail & Related papers (2024-01-26T03:36:13Z) - Finite-Key Analysis for Coherent One-Way Quantum Key Distribution [18.15943439545963]
Coherent-one-way (COW) quantum key distribution (QKD) is a significant communication protocol that has been implemented experimentally and deployed in practical products.
Existing security analyses of COW-QKD either provide a short transmission distance or lack immunity against coherent attacks in the finite-key regime.
We present a tight finite-key framework for a variant of COW-QKD, which has been proven to extend the secure transmission distance in the case.
arXiv Detail & Related papers (2023-09-28T03:32:06Z) - Robust and efficient verification of graph states in blind
measurement-based quantum computation [52.70359447203418]
Blind quantum computation (BQC) is a secure quantum computation method that protects the privacy of clients.
It is crucial to verify whether the resource graph states are accurately prepared in the adversarial scenario.
Here, we propose a robust and efficient protocol for verifying arbitrary graph states with any prime local dimension.
arXiv Detail & Related papers (2023-05-18T06:24:45Z) - QKD Based on Time-Entangled Photons and its Key-Rate Promise [24.07745562101555]
Time-entanglement-based QKD promises to increase the secret key rate and distribution compared to other QKD implementations.
We overview state-of-the-art from the information and coding theory perspective.
arXiv Detail & Related papers (2023-03-03T14:40:40Z) - Data post-processing for the one-way heterodyne protocol under
composable finite-size security [62.997667081978825]
We study the performance of a practical continuous-variable (CV) quantum key distribution protocol.
We focus on the Gaussian-modulated coherent-state protocol with heterodyne detection in a high signal-to-noise ratio regime.
This allows us to study the performance for practical implementations of the protocol and optimize the parameters connected to the steps above.
arXiv Detail & Related papers (2022-05-20T12:37:09Z) - Simple Proof of Security of the multiparty Prepare and Measure QKD [0.0]
This paper examines the prepare and measure version of multiparty communication through quantum key distribution.
It is sufficient to have the capability of preparing and measuring a single qubit state.
arXiv Detail & Related papers (2022-04-11T16:01:12Z) - Twin-field quantum key distribution with passive-decoy state [22.26373392802507]
We propose passive-decoy based TF-QKD, in which we combine TF-QKD with the passive-decoy method.
We present a simulation comparing the key generation rate with that in active-decoy, the result shows our scheme performs as good as active decoy TF-QKD.
arXiv Detail & Related papers (2020-11-15T04:02:48Z) - Reference-Frame-Independent, Measurement-Device-Independent quantum key
distribution using fewer quantum states [1.1242503819703258]
We show that RFI-MDI-QKD can be implemented using fewer quantum states than those of its original proposal.
Compared to the conventional RFI-MDI-QKD where both parties should transmit six quantum states, it significantly simplifies the implementation of the QKD protocol.
arXiv Detail & Related papers (2020-02-05T01:44:29Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.