Fully-Passive Twin-Field Quantum Key Distribution
- URL: http://arxiv.org/abs/2304.12062v1
- Date: Mon, 24 Apr 2023 12:57:39 GMT
- Title: Fully-Passive Twin-Field Quantum Key Distribution
- Authors: Wenyuan Wang, Rong Wang, Hoi-Kwong Lo
- Abstract summary: We propose a fully-passive twin-field quantum key distribution (QKD) setup where basis choice, decoy-state preparation and encoding are all implemented by post-processing.
Our protocol can remove the potential side-channels from both source modulators and detectors.
We show with numerical simulation that the new protocol can still beat the repeaterless bound and provide satisfactory key rate.
- Score: 21.245712027667683
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: We propose a fully-passive twin-field quantum key distribution (QKD) setup
where basis choice, decoy-state preparation and encoding are all implemented
entirely by post-processing without any active modulation. Our protocol can
remove the potential side-channels from both source modulators and detectors,
and additionally retain the high key rate advantage offered by twin-field QKD,
thus offering great implementation security and good performance. Importantly,
we also propose a post-processing strategy that uses mismatched phase slices
and minimizes the effect of sifting. We show with numerical simulation that the
new protocol can still beat the repeaterless bound and provide satisfactory key
rate.
Related papers
- Improved finite-size key rates for discrete-modulated continuous variable quantum key distribution under coherent attacks [0.0]
We consider a prepare-and-measure CVQKD protocol, where Alice chooses from a set of four coherent states and Bob performs a heterodyne measurement.
We provide a security proof against coherent attacks in the finite-size regime, and compute the achievable key rate.
arXiv Detail & Related papers (2024-07-03T13:18:31Z) - Phase coding semi-quantum key distribution system based on the Single-state protocol [7.265016168468835]
We propose and implement a phase-encoded semi-quantum key distribution system based on the Single-state protocol and the "selective modulation" method.
The interference contrast achieved 96.52%, the average quantum bit error rate was 1.19%, and the raw key rate reached 88Kbps.
This work validates the feasibility of semi-quantum key distribution experiments and provides ideas for future research on semi-quantum key distribution experiments and security studies.
arXiv Detail & Related papers (2024-05-13T05:10:30Z) - Optimal control in large open quantum systems: the case of transmon readout and reset [44.99833362998488]
We present a framework that combines the adjoint state method together with reverse-time back-propagation to solve prohibitively large open-system quantum control problems.
We apply this framework to optimize two inherently dissipative operations in superconducting qubits.
Our results show that, given a fixed set of system parameters, shaping the control pulses can yield 2x improvements in the fidelity and duration for both of these operations.
arXiv Detail & Related papers (2024-03-21T18:12:51Z) - Finite-key security of passive quantum key distribution [0.0]
The passive approach to quantum key distribution (QKD) consists of eliminating all optical modulators and random number generators from QKD systems.
We provide finite-key security bounds for a fully passive decoy-state BB84 protocol.
arXiv Detail & Related papers (2023-08-04T15:18:25Z) - Phase-Matching Quantum Key Distribution without Intensity Modulation [25.004151934190965]
We propose a phase-matching quantum key distribution protocol without intensity modulation.
Simulation results show that the transmission distance of our protocol could reach 305 km in telecommunication fiber.
Our protocol provides a promising solution for constructing quantum networks.
arXiv Detail & Related papers (2023-03-21T04:32:01Z) - High-Rate Point-to-Multipoint Quantum Key Distribution using Coherent
States [6.058240259980149]
Quantum key distribution (QKD) which enables information-theoretically security is now heading towards quantum secure networks.
It requires high-performance and cost-effective protocols while increasing the number of users.
Here, we show a 'protocol solution' using continuous-variable quantum information.
arXiv Detail & Related papers (2023-02-05T14:21:33Z) - Data post-processing for the one-way heterodyne protocol under
composable finite-size security [62.997667081978825]
We study the performance of a practical continuous-variable (CV) quantum key distribution protocol.
We focus on the Gaussian-modulated coherent-state protocol with heterodyne detection in a high signal-to-noise ratio regime.
This allows us to study the performance for practical implementations of the protocol and optimize the parameters connected to the steps above.
arXiv Detail & Related papers (2022-05-20T12:37:09Z) - Discrete-variable quantum key distribution with homodyne detection [14.121646217925441]
We propose a protocol that combines the simplicity of quantum state preparation in DV-QKD together with the cost-effective and high-bandwidth of homodyne detectors used in CV-QKD.
Our simulation suggests that the protocol is suitable for secure and high-speed practical key distribution over distances.
arXiv Detail & Related papers (2021-09-01T17:12:28Z) - Towards fully-fledged quantum and classical communication over deployed
fiber with up-conversion module [47.187609203210705]
We propose and demonstrate a new method, based on up-conversion assisted receiver, for co-propagating classical light and QKD signals.
Our proposal exhibits higher tolerance for noise in comparison to the standard receiver, thus enabling the distribution of secret keys in the condition of 4 dB-higher classical power.
arXiv Detail & Related papers (2021-06-09T13:52:27Z) - Composably secure data processing for Gaussian-modulated continuous
variable quantum key distribution [58.720142291102135]
Continuous-variable quantum key distribution (QKD) employs the quadratures of a bosonic mode to establish a secret key between two remote parties.
We consider a protocol with homodyne detection in the general setting of composable finite-size security.
In particular, we analyze the high signal-to-noise regime which requires the use of high-rate (non-binary) low-density parity check codes.
arXiv Detail & Related papers (2021-03-30T18:02:55Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.