Using Cascade in Quantum Key Distribution
- URL: http://arxiv.org/abs/2307.00576v2
- Date: Mon, 25 Dec 2023 12:37:10 GMT
- Title: Using Cascade in Quantum Key Distribution
- Authors: Devashish Tupkary, Norbert L\"utkenhaus
- Abstract summary: We point out a critical flaw in the analysis of Quantum Key Distribution (QKD) protocols that employ the two-way error correction protocol Cascade.
We present a straightforward and elegant alternative approach that addresses this flaw and produces valid key rates.
- Score: 0.0
- License: http://creativecommons.org/licenses/by-nc-sa/4.0/
- Abstract: We point out a critical flaw in the analysis of Quantum Key Distribution
(QKD) protocols that employ the two-way error correction protocol Cascade.
Specifically, this flaw stems from an incom-plete consideration of all two-way
communication that occurs during the Cascade protocol. We present a
straightforward and elegant alternative approach that addresses this flaw and
produces valid key rates. We exemplify our new approach by comparing its key
rates with those generated using older, incorrect approaches, for Qubit BB84
and Decoy-State BB84 protocols. We show that in many practically relevant
situations, our rectified approach produces the same key rate as older,
incorrect approaches. However, in other scenarios, our approach produces valid
key rates that are lower, highlighting the importance of properly accounting
for all two-way communication during Cascade.
Related papers
- Improved finite-size effects in QKD protocols with applications to decoy-state QKD [0.0]
We present a finite-size security proof for generic quantum key distribution protocols against independent and identically distributed collective attacks.
We extend our proof to coherent attacks and variable-length protocols.
arXiv Detail & Related papers (2025-02-07T23:37:50Z) - Twin-field-based multi-party quantum key agreement [0.0]
We study a method to extend the twin-field key distribution protocol to a scheme for multi-party quantum key agreement.
We derive the key rate based on the entanglement-based source-replacement scheme.
arXiv Detail & Related papers (2024-09-06T11:51:10Z) - Performance of Cascade and LDPC-codes for Information Reconciliation on Industrial Quantum Key Distribution Systems [69.47813697920358]
We analyze, simulate, optimize, and compare the performance of two prevalent algorithms used for Information Reconciliation.
We focus on their applicability in practical and industrial settings, operating in realistic and application-close conditions.
arXiv Detail & Related papers (2024-08-28T12:51:03Z) - Device-independent quantum key distribution based on routed Bell tests [0.0]
We investigate DIQKD protocols based on a routed setup.
In these protocols, photons from the source are routed by an actively controlled switch to a nearby test device instead of the distant one.
We find that in an ideal case routed DIQKD protocols can significantly improve detection efficiency requirements, by up to $sim 30%$.
arXiv Detail & Related papers (2024-04-01T15:59:09Z) - New protocols for quantum key distribution with explicit upper and lower bound on secret key rate [0.0]
We present two new schemes for quantum key distribution (QKD) that neither require entanglement nor an ideal single-photon source.<n>These protocols are shown to be secure against multiple attacks, including intercept-resend and a class of collective attacks.<n>A trade-off between quantum resources and information revealed to an eavesdropper (Eve) is observed, with higher efficiency achievable through the use of additional quantum resources.
arXiv Detail & Related papers (2022-12-26T11:14:39Z) - Upper bounds on key rates in device-independent quantum key distribution
based on convex-combination attacks [1.118478900782898]
We present the convex-combination attack as an efficient, easy-to-use technique for upper-bounding DIQKD key rates.
It allows verifying the accuracy of lower bounds on key rates for state-of-the-art protocols.
arXiv Detail & Related papers (2022-06-13T15:27:48Z) - Data post-processing for the one-way heterodyne protocol under
composable finite-size security [62.997667081978825]
We study the performance of a practical continuous-variable (CV) quantum key distribution protocol.
We focus on the Gaussian-modulated coherent-state protocol with heterodyne detection in a high signal-to-noise ratio regime.
This allows us to study the performance for practical implementations of the protocol and optimize the parameters connected to the steps above.
arXiv Detail & Related papers (2022-05-20T12:37:09Z) - Software mitigation of coherent two-qubit gate errors [55.878249096379804]
Two-qubit gates are important components of quantum computing.
But unwanted interactions between qubits (so-called parasitic gates) can degrade the performance of quantum applications.
We present two software methods to mitigate parasitic two-qubit gate errors.
arXiv Detail & Related papers (2021-11-08T17:37:27Z) - Discrete-variable quantum key distribution with homodyne detection [14.121646217925441]
We propose a protocol that combines the simplicity of quantum state preparation in DV-QKD together with the cost-effective and high-bandwidth of homodyne detectors used in CV-QKD.
Our simulation suggests that the protocol is suitable for secure and high-speed practical key distribution over distances.
arXiv Detail & Related papers (2021-09-01T17:12:28Z) - Composably secure data processing for Gaussian-modulated continuous
variable quantum key distribution [58.720142291102135]
Continuous-variable quantum key distribution (QKD) employs the quadratures of a bosonic mode to establish a secret key between two remote parties.
We consider a protocol with homodyne detection in the general setting of composable finite-size security.
In particular, we analyze the high signal-to-noise regime which requires the use of high-rate (non-binary) low-density parity check codes.
arXiv Detail & Related papers (2021-03-30T18:02:55Z) - Round-robin differential phase-time-shifting protocol for quantum key
distribution: theory and experiment [58.03659958248968]
Quantum key distribution (QKD) allows the establishment of common cryptographic keys among distant parties.
Recently, a QKD protocol that circumvents the need for monitoring signal disturbance, has been proposed and demonstrated in initial experiments.
We derive the security proofs of the round-robin differential phase-time-shifting protocol in the collective attack scenario.
Our results show that the RRDPTS protocol can achieve higher secret key rate in comparison with the RRDPS, in the condition of high quantum bit error rate.
arXiv Detail & Related papers (2021-03-15T15:20:09Z) - Entanglement purification by counting and locating errors with
entangling measurements [62.997667081978825]
We consider entanglement purification protocols for multiple copies of qubit states.
We use high-dimensional auxiliary entangled systems to learn about number and positions of errors in the noisy ensemble.
arXiv Detail & Related papers (2020-11-13T19:02:33Z) - Key rates for quantum key distribution protocols with asymmetric noise [0.0]
We consider the key rates achieved in the simplest quantum key distribution protocols, namely the BB84 and the six-state protocols, when non-uniform noise is present in the system.
We show that it can be advantageous to use the basis with higher quantum bit error rate for the key generation.
arXiv Detail & Related papers (2020-02-18T00:05:35Z) - Tight security bounds for decoy-state quantum key distribution [1.1563829079760959]
The BB84 quantum key distribution (QKD) combined with decoy-state method is currently the most practical protocol.
Here, we provide the rigorous and optimal analytic formula to solve the above tasks.
Our results can be widely applied to deal with statistical fluctuation in quantum cryptography protocols.
arXiv Detail & Related papers (2020-02-16T07:48:25Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.