General treatment of Gaussian trusted noise in continuous variable
quantum key distribution
- URL: http://arxiv.org/abs/2305.17684v1
- Date: Sun, 28 May 2023 10:38:36 GMT
- Title: General treatment of Gaussian trusted noise in continuous variable
quantum key distribution
- Authors: Shinichiro Yamano, Takaya Matsuura, Yui Kuramochi, Toshihiko Sasaki,
Masato Koashi
- Abstract summary: A trusted device scenario assumes that an adversary has no access to imperfections such as electronic noises in the detector is expected to provide significant improvement in the key rate.
Here, we develop a simple and general treatment that can incorporate the effects of Gaussian trusted noises for any protocol that uses homodyne/heterodyne measurements.
In our method, a rescaling of the outcome of a noisy homodyne/heterodyne detector renders it equivalent to the outcome of a noiseless detector with a tiny additional loss.
- Score: 1.0499611180329804
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Continuous Variable (CV) quantum key distribution (QKD) is a promising
candidate for practical implementations due to its compatibility with the
existing communication technology. A trusted device scenario assuming that an
adversary has no access to imperfections such as electronic noises in the
detector is expected to provide significant improvement in the key rate, but
such an endeavor so far was made separately for specific protocols and for
specific proof techniques. Here, we develop a simple and general treatment that
can incorporate the effects of Gaussian trusted noises for any protocol that
uses homodyne/heterodyne measurements. In our method, a rescaling of the
outcome of a noisy homodyne/heterodyne detector renders it equivalent to the
outcome of a noiseless detector with a tiny additional loss, thanks to a
noise-loss equivalence well-known in quantum optics. Since this method is
independent of protocols and security proofs, it is applicable to
Gaussian-modulation and discrete-modulation protocols, to the finite-size
regime, and to any proof techniques developed so far and yet to be discovered
as well.
Related papers
- Trusted source noise model of discrete-modulated continuous-variable quantum key distribution [8.019408649120262]
discrete-modulated continuous-variable quantum key distribution.
Traditional approach is to assume that eavesdroppers can control all of the source noise.
We tailor a trusted model specifically for the discrete-modulated protocol and upgrade the security analysis accordingly.
arXiv Detail & Related papers (2024-07-29T10:35:33Z) - Robust Control for Dynamical Systems With Non-Gaussian Noise via Formal
Abstractions [59.605246463200736]
We present a novel controller synthesis method that does not rely on any explicit representation of the noise distributions.
First, we abstract the continuous control system into a finite-state model that captures noise by probabilistic transitions between discrete states.
We use state-of-the-art verification techniques to provide guarantees on the interval Markov decision process and compute a controller for which these guarantees carry over to the original control system.
arXiv Detail & Related papers (2023-01-04T10:40:30Z) - The Quantum Chernoff Divergence in Advantage Distillation for QKD and
DIQKD [0.0]
Device-independent quantum key distribution (DIQKD) aims to mitigate adversarial exploitation of imperfections in quantum devices.
We present an alternative proof structure that replaces the fidelity with the quantum Chernoff divergence.
Our results provide insight into a fundamental question in quantum information theory regarding the circumstances under which DIQKD is possible.
arXiv Detail & Related papers (2022-12-14T01:44:23Z) - Suppressing Amplitude Damping in Trapped Ions: Discrete Weak
Measurements for a Non-unitary Probabilistic Noise Filter [62.997667081978825]
We introduce a low-overhead protocol to reverse this degradation.
We present two trapped-ion schemes for the implementation of a non-unitary probabilistic filter against amplitude damping noise.
This filter can be understood as a protocol for single-copy quasi-distillation.
arXiv Detail & Related papers (2022-09-06T18:18:41Z) - Data post-processing for the one-way heterodyne protocol under
composable finite-size security [62.997667081978825]
We study the performance of a practical continuous-variable (CV) quantum key distribution protocol.
We focus on the Gaussian-modulated coherent-state protocol with heterodyne detection in a high signal-to-noise ratio regime.
This allows us to study the performance for practical implementations of the protocol and optimize the parameters connected to the steps above.
arXiv Detail & Related papers (2022-05-20T12:37:09Z) - Homodyne Detection Quadrature Phase Shift Keying Continuous-Variable
Quantum Key Distribution with High Excess Noise Tolerance [7.87972015113057]
We propose a homodyne detection protocol using the quadrature phase shift keying technique.
By limiting information leakage, our proposed protocol enhances excess noise tolerance to a high level.
Our results imply that the current protocol is able to distribute keys in nearly intercity area.
arXiv Detail & Related papers (2021-04-22T16:10:35Z) - Composably secure data processing for Gaussian-modulated continuous
variable quantum key distribution [58.720142291102135]
Continuous-variable quantum key distribution (QKD) employs the quadratures of a bosonic mode to establish a secret key between two remote parties.
We consider a protocol with homodyne detection in the general setting of composable finite-size security.
In particular, we analyze the high signal-to-noise regime which requires the use of high-rate (non-binary) low-density parity check codes.
arXiv Detail & Related papers (2021-03-30T18:02:55Z) - Round-robin differential phase-time-shifting protocol for quantum key
distribution: theory and experiment [58.03659958248968]
Quantum key distribution (QKD) allows the establishment of common cryptographic keys among distant parties.
Recently, a QKD protocol that circumvents the need for monitoring signal disturbance, has been proposed and demonstrated in initial experiments.
We derive the security proofs of the round-robin differential phase-time-shifting protocol in the collective attack scenario.
Our results show that the RRDPTS protocol can achieve higher secret key rate in comparison with the RRDPS, in the condition of high quantum bit error rate.
arXiv Detail & Related papers (2021-03-15T15:20:09Z) - Efficient and robust certification of genuine multipartite entanglement
in noisy quantum error correction circuits [58.720142291102135]
We introduce a conditional witnessing technique to certify genuine multipartite entanglement (GME)
We prove that the detection of entanglement in a linear number of bipartitions by a number of measurements scales linearly, suffices to certify GME.
We apply our method to the noisy readout of stabilizer operators of the distance-three topological color code and its flag-based fault-tolerant version.
arXiv Detail & Related papers (2020-10-06T18:00:07Z) - Noisy receivers for quantum illumination [0.0]
Quantum illumination (QI) promises unprecedented performances in target detection.
Signal and idler recombination forms a crucial barrier to the protocol's success.
This could potentially be mitigated if performing a measurement on the idler mode could still yield a quantum advantage.
arXiv Detail & Related papers (2020-06-08T17:42:19Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.