An Analysis of the Completion Time of the BB84 Protocol
- URL: http://arxiv.org/abs/2304.10218v1
- Date: Thu, 20 Apr 2023 11:30:44 GMT
- Title: An Analysis of the Completion Time of the BB84 Protocol
- Authors: Sounak Kar, Jean-Yves Le Boudec
- Abstract summary: The BB84 QKD protocol is based on the idea that the sender and the receiver can reconcile a certain fraction of the teleported qubits.
decoherence of quantum states poses a significant challenge to performing perfect or efficient teleportation.
We do a performance analysis of the completion time of the BB84 protocol in a setting where the sender and the receiver are connected via a single quantum repeater.
- Score: 5.421615560456378
- License: http://creativecommons.org/licenses/by-nc-sa/4.0/
- Abstract: The BB84 QKD protocol is based on the idea that the sender and the receiver
can reconcile a certain fraction of the teleported qubits to detect
eavesdropping or noise and decode the rest to use as a private key. Under the
present hardware infrastructure, decoherence of quantum states poses a
significant challenge to performing perfect or efficient teleportation, meaning
that a teleportation-based protocol must be run multiple times to observe
success. Thus, performance analyses of such protocols usually consider the
completion time, i.e., the time until success, rather than the duration of a
single attempt. Moreover, due to decoherence, the success of an attempt is in
general dependent on the duration of individual phases of that attempt, as
quantum states must wait in memory while the success or failure of a generation
phase is communicated to the relevant parties. In this work, we do a
performance analysis of the completion time of the BB84 protocol in a setting
where the sender and the receiver are connected via a single quantum repeater
and the only quantum channel between them does not see any adversarial attack.
Assuming certain distributional forms for the generation and communication
phases of teleportation, we provide a method to compute the MGF of the
completion time and subsequently derive an estimate of the CDF and a bound on
the tail probability. This result helps us gauge the (tail) behaviour of the
completion time in terms of the parameters characterising the elementary phases
of teleportation, without having to run the protocol multiple times. We also
provide an efficient simulation scheme to generate the completion time, which
relies on expressing the completion time in terms of aggregated teleportation
times. We numerically compare our approach with a full-scale simulation and
observe good agreement between them.
Related papers
- Robust and efficient verification of graph states in blind
measurement-based quantum computation [52.70359447203418]
Blind quantum computation (BQC) is a secure quantum computation method that protects the privacy of clients.
It is crucial to verify whether the resource graph states are accurately prepared in the adversarial scenario.
Here, we propose a robust and efficient protocol for verifying arbitrary graph states with any prime local dimension.
arXiv Detail & Related papers (2023-05-18T06:24:45Z) - Importance sampling for stochastic quantum simulations [68.8204255655161]
We introduce the qDrift protocol, which builds random product formulas by sampling from the Hamiltonian according to the coefficients.
We show that the simulation cost can be reduced while achieving the same accuracy, by considering the individual simulation cost during the sampling stage.
Results are confirmed by numerical simulations performed on a lattice nuclear effective field theory.
arXiv Detail & Related papers (2022-12-12T15:06:32Z) - Single-photon-memory measurement-device-independent quantum secure
direct communication [63.75763893884079]
Quantum secure direct communication (QSDC) uses the quantum channel to transmit information reliably and securely.
In order to eliminate the security loopholes resulting from practical detectors, the measurement-device-independent (MDI) QSDC protocol has been proposed.
We propose a single-photon-memory MDI QSDC protocol (SPMQC) for dispensing with high-performance quantum memory.
arXiv Detail & Related papers (2022-12-12T02:23:57Z) - Data post-processing for the one-way heterodyne protocol under
composable finite-size security [62.997667081978825]
We study the performance of a practical continuous-variable (CV) quantum key distribution protocol.
We focus on the Gaussian-modulated coherent-state protocol with heterodyne detection in a high signal-to-noise ratio regime.
This allows us to study the performance for practical implementations of the protocol and optimize the parameters connected to the steps above.
arXiv Detail & Related papers (2022-05-20T12:37:09Z) - Time Series Quantum Reservoir Computing with Weak and Projective
Measurements [0.0]
We show that it is possible to exploit the quantumness of the reservoir and to obtain ideal performance.
One consists in rewinding part of the dynamics determined by the fading memory of the reservoir and storing the corresponding data of the input sequence.
The other employs weak measurements operating online at the trade-off where information can be extracted accurately and without hindering the needed memory.
arXiv Detail & Related papers (2022-05-13T17:57:39Z) - Benchmarking of Quantum Protocols [0.9176056742068812]
We consider several quantum protocols that enable promising functionalities and services in near-future quantum networks.
We use NetSquid simulation platform to evaluate the effect of various sources of noise on the performance of these protocols.
arXiv Detail & Related papers (2021-11-03T21:17:04Z) - The Role of Localizable Concurrence in Quantum Teleportation Protocols [0.0]
For mixed multi-partite states the lack of computable entanglement measures has made the identification of the quantum resource responsible for this advantage more challenging.
We show that any teleportation protocol using an arbitrary multi-partite state, that includes a Bell measurement, requires a non-vanishing localizable concurrence between two of its parties in order to perform better than the classical protocol.
arXiv Detail & Related papers (2021-06-12T01:00:52Z) - Sample-efficient device-independent quantum state verification and
certification [68.8204255655161]
Authentication of quantum sources is a crucial task in building reliable and efficient protocols for quantum-information processing.
We develop a systematic approach to device-independent verification of quantum states free of IID assumptions in the finite copy regime.
We show that device-independent verification can be performed with optimal sample efficiency.
arXiv Detail & Related papers (2021-05-12T17:48:04Z) - Composably secure data processing for Gaussian-modulated continuous
variable quantum key distribution [58.720142291102135]
Continuous-variable quantum key distribution (QKD) employs the quadratures of a bosonic mode to establish a secret key between two remote parties.
We consider a protocol with homodyne detection in the general setting of composable finite-size security.
In particular, we analyze the high signal-to-noise regime which requires the use of high-rate (non-binary) low-density parity check codes.
arXiv Detail & Related papers (2021-03-30T18:02:55Z) - Noise Detection with Spectator Qubits and Quantum Feature Engineering [0.0]
We propose a protocol that makes use of a spectator qubit to monitor the noise in real-time.
The complexity of the protocol is front-loaded in a characterization phase, which allow real-time execution.
We present the results of numerical simulations that showcase the favorable performance of the protocol.
arXiv Detail & Related papers (2021-03-24T06:55:13Z) - Improved analytical bounds on delivery times of long-distance
entanglement [0.0]
We provide improved analytical bounds on the average and on the quantiles of the completion time of entanglement distribution protocols.
A canonical example of such a protocol is a nested quantum repeater scheme which consists of heralded entanglement generation and entanglement swaps.
arXiv Detail & Related papers (2021-03-21T18:14:56Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.