Complete security analysis of {quantum key distribution} based on
unified model of sequential discrimination strategy
- URL: http://arxiv.org/abs/2309.14719v1
- Date: Tue, 26 Sep 2023 07:23:34 GMT
- Title: Complete security analysis of {quantum key distribution} based on
unified model of sequential discrimination strategy
- Authors: Min Namkung and Younghun Kwon
- Abstract summary: We propose a unified model of sequential discrimination including an eavesdropper.
We obtain a non-zero secret key rate between the sender and receiver, which implies that the sender and receiver can share a secret key despite eavesdropping.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: The quantum key distribution for multiparty is one of the essential subjects
of study. Especially, without using entangled states, performing the quantum
key distribution for multiparty is a critical area of research. For this
purpose, sequential discrimination, which provides multiparty quantum
communication and quantum key distribution for {multiple receivers}, has
recently been introduced. However, since there is a possibility of
eavesdropping on the measurement result of a receiver by an intruder using
quantum entanglement, a security analysis for {quantum key distribution} should
be performed. {However,} no one has provided the security analysis for {quantum
key distribution in view of the sequential scheme} yet. In this work, by
proposing a unified model of sequential discrimination including an
eavesdropper, we provide the security analysis of {quantum key distribution
based on the unified model of sequential discrimination strategy.} In this
model, the success probability of eavesdropping and the secret key rate can be
used as a figure of merit. Then, we obtain a non-zero secret key rate between
the sender and receiver, which implies that the sender and receiver can share a
secret key despite eavesdropping. Further, we propose a realistic quantum
optical experiment for the proposed model. We observe that the secret key
between the sender and receiver can be non-zero, even with imperfections. As
opposed to common belief, we further observe that the success probability of
eavesdropping is smaller in the case of colored noise than in the case of white
noise.
Related papers
- Fundamental Limitations within the Selected Cryptographic Scenarios and
Supra-Quantum Theories [0.0]
We study the fundamental limitations within the selected quantum and supra-quantum cryptographic scenarios.
We investigate various security paradigms, bipartite and multipartite settings.
We propose a novel type of rerouting attack on the quantum Internet.
arXiv Detail & Related papers (2023-11-14T14:48:57Z) - Harnessing high-dimensional temporal entanglement using limited interferometric setups [41.94295877935867]
We develop the first complete analysis of high-dimensional entanglement in the polarization-time-domain.
We show how to efficiently certify relevant density matrix elements and security parameters for Quantum Key Distribution.
We propose a novel setup that can further enhance the noise resistance of free-space quantum communication.
arXiv Detail & Related papers (2023-08-08T17:44:43Z) - Semi-device independent nonlocality certification for near-term quantum
networks [46.37108901286964]
Bell tests are the most rigorous method for verifying entanglement in quantum networks.
If there is any signaling between the parties, then the violation of Bell inequalities can no longer be used.
We propose a semi-device independent protocol that allows us to numerically correct for effects of correlations in experimental probability distributions.
arXiv Detail & Related papers (2023-05-23T14:39:08Z) - Quantum Conformal Prediction for Reliable Uncertainty Quantification in
Quantum Machine Learning [47.991114317813555]
Quantum models implement implicit probabilistic predictors that produce multiple random decisions for each input through measurement shots.
This paper proposes to leverage such randomness to define prediction sets for both classification and regression that provably capture the uncertainty of the model.
arXiv Detail & Related papers (2023-04-06T22:05:21Z) - Revocable Cryptography from Learning with Errors [61.470151825577034]
We build on the no-cloning principle of quantum mechanics and design cryptographic schemes with key-revocation capabilities.
We consider schemes where secret keys are represented as quantum states with the guarantee that, once the secret key is successfully revoked from a user, they no longer have the ability to perform the same functionality as before.
arXiv Detail & Related papers (2023-02-28T18:58:11Z) - Certified Robustness of Quantum Classifiers against Adversarial Examples
through Quantum Noise [68.1992787416233]
We show that adding quantum random rotation noise can improve robustness in quantum classifiers against adversarial attacks.
We derive a certified robustness bound to enable quantum classifiers to defend against adversarial examples.
arXiv Detail & Related papers (2022-11-02T05:17:04Z) - A simple relation of guessing probability in quantum key distribution [0.45687771576879593]
The receiver-eavesdropper similarity implies a simple relation in terms of guessing probability and correctness of sifted keys.
The regions of error rates determined by such a guessing-probability-based relation are shown to be close to those determined by security criteria.
arXiv Detail & Related papers (2021-12-22T10:41:39Z) - A coherence-witnessing game and applications to semi-device-independent
quantum key distribution [1.024113475677323]
We introduce a coherence-based, semi-device-independent, semi-quantum key distribution protocol built upon a noise-robust version of a coherence equality game.
Security is proven in the bounded quantum storage model, requiring users to implement only classical operations.
arXiv Detail & Related papers (2021-03-11T17:55:34Z) - Bell nonlocality is not sufficient for the security of standard
device-independent quantum key distribution protocols [1.9573380763700712]
Device-independent quantum key distribution is a secure quantum cryptographic paradigm that allows two honest users to establish a secret key.
We show that no protocol of this form allows for establishing a secret key when implemented on any correlation obtained by measuring local projective measurements.
arXiv Detail & Related papers (2021-03-03T19:10:06Z) - Tight finite-key analysis for generalized high-dimensional quantum key
distribution [23.578892457164933]
We propose a tight finite-key analysis suitable for generalized high-dimensional quantum key distribution protocols.
Benefitting from our theory, high-dimensional quantum key distribution protocols with finite resources become experimentally feasible.
arXiv Detail & Related papers (2020-08-08T12:33:53Z) - Quantum noise protects quantum classifiers against adversaries [120.08771960032033]
Noise in quantum information processing is often viewed as a disruptive and difficult-to-avoid feature, especially in near-term quantum technologies.
We show that by taking advantage of depolarisation noise in quantum circuits for classification, a robustness bound against adversaries can be derived.
This is the first quantum protocol that can be used against the most general adversaries.
arXiv Detail & Related papers (2020-03-20T17:56:14Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.