Device-Independent Quantum Key Distribution beyond qubits
- URL: http://arxiv.org/abs/2402.00161v1
- Date: Wed, 31 Jan 2024 20:36:48 GMT
- Title: Device-Independent Quantum Key Distribution beyond qubits
- Authors: Javier Rivera-Dean, Anna Steffinlongo, Neil Parker-S\'anchez, Antonio
Ac\'in, Enky Oudot
- Abstract summary: Device-Independent Quantum Key Distribution (DIQKD) aims to generate secret keys between two parties without relying on trust in their employed devices.
This study explores the resilience of high-dimensional quantum systems in DIQKD, focusing on a comparison between qubits and qutrits.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Device-Independent Quantum Key Distribution (DIQKD) aims to generate secret
keys between two parties without relying on trust in their employed devices,
imposing strict noise constraints for key generation. This study explores the
resilience of high-dimensional quantum systems in DIQKD, focusing on a
comparison between qubits and qutrits. Lower bounds on achievable key rates are
investigated through numerical optimization, while upper bounds are evaluated
using the Convex-Combination attack, which has been further extended to account
for arbitrary dimensions. The observed difference between these bounds provides
insights into noise thresholds and potential enhancements in DIQKD scenarios,
prompting debate on the merit of increased dimensions given the associated
experimental efforts required.
Related papers
- Entropy bounds for device-independent quantum key distribution with local Bell test [0.0]
One of the main challenges in device-independent quantum key distribution (DIQKD) is achieving the required Bell violation over long distances.
Recent works have explored the concept of certifying nonlocal correlations over extended distances through the use of a local Bell test.
Here, an additional quantum device is placed in close proximity to one party, using short-distance correlations to verify nonlocal behavior at long distances.
arXiv Detail & Related papers (2024-03-31T20:33:40Z) - A Quantum-Classical Collaborative Training Architecture Based on Quantum
State Fidelity [50.387179833629254]
We introduce a collaborative classical-quantum architecture called co-TenQu.
Co-TenQu enhances a classical deep neural network by up to 41.72% in a fair setting.
It outperforms other quantum-based methods by up to 1.9 times and achieves similar accuracy while utilizing 70.59% fewer qubits.
arXiv Detail & Related papers (2024-02-23T14:09:41Z) - Fundamental Limitations within the Selected Cryptographic Scenarios and
Supra-Quantum Theories [0.0]
We study the fundamental limitations within the selected quantum and supra-quantum cryptographic scenarios.
We investigate various security paradigms, bipartite and multipartite settings.
We propose a novel type of rerouting attack on the quantum Internet.
arXiv Detail & Related papers (2023-11-14T14:48:57Z) - How to harness high-dimensional temporal entanglement, using limited
interferometry setups [62.997667081978825]
We develop the first complete analysis of high-dimensional entanglement in the polarization-time-domain.
We show how to efficiently certify relevant density matrix elements and security parameters for Quantum Key Distribution.
We propose a novel setup that can further enhance the noise resistance of free-space quantum communication.
arXiv Detail & Related papers (2023-08-08T17:44:43Z) - Certified Robustness of Quantum Classifiers against Adversarial Examples
through Quantum Noise [68.1992787416233]
We show that adding quantum random rotation noise can improve robustness in quantum classifiers against adversarial attacks.
We derive a certified robustness bound to enable quantum classifiers to defend against adversarial examples.
arXiv Detail & Related papers (2022-11-02T05:17:04Z) - Upper bounds on key rates in device-independent quantum key distribution
based on convex-combination attacks [1.118478900782898]
We present the convex-combination attack as an efficient, easy-to-use technique for upper-bounding DIQKD key rates.
It allows verifying the accuracy of lower bounds on key rates for state-of-the-art protocols.
arXiv Detail & Related papers (2022-06-13T15:27:48Z) - Experimental violations of Leggett-Garg's inequalities on a quantum
computer [77.34726150561087]
We experimentally observe the violations of Leggett-Garg-Bell's inequalities on single and multi-qubit systems.
Our analysis highlights the limits of nowadays quantum platforms, showing that the above-mentioned correlation functions deviate from theoretical prediction as the number of qubits and the depth of the circuit grow.
arXiv Detail & Related papers (2021-09-06T14:35:15Z) - Upper bounds on device-independent quantum key distribution rates in
static and dynamic scenarios [3.3399953831968334]
We develop upper bounds for key rates for device-independent quantum key distribution (DI-QKD) protocols and devices.
We show that the convex hull of the currently known bounds is a tighter upper bound on the device-independent key rates of standard CHSH-based protocol.
We show that the device-independent private capacity for the CHSH based protocols on depolarizing and erasure channels is limited by the secret key capacity of dephasing channels.
arXiv Detail & Related papers (2021-07-13T22:01:09Z) - Towards fully-fledged quantum and classical communication over deployed
fiber with up-conversion module [47.187609203210705]
We propose and demonstrate a new method, based on up-conversion assisted receiver, for co-propagating classical light and QKD signals.
Our proposal exhibits higher tolerance for noise in comparison to the standard receiver, thus enabling the distribution of secret keys in the condition of 4 dB-higher classical power.
arXiv Detail & Related papers (2021-06-09T13:52:27Z) - Overcoming the rate-distance limit of device-independent quantum key
distribution [7.864517207531803]
Device-independent quantum key distribution (DIQKD) exploits the violation of a Bell inequality to extract secure key.
We propose a heralded DIQKD scheme based on entangled coherent states to improve entangling rates.
arXiv Detail & Related papers (2021-03-31T14:58:46Z) - Composably secure data processing for Gaussian-modulated continuous
variable quantum key distribution [58.720142291102135]
Continuous-variable quantum key distribution (QKD) employs the quadratures of a bosonic mode to establish a secret key between two remote parties.
We consider a protocol with homodyne detection in the general setting of composable finite-size security.
In particular, we analyze the high signal-to-noise regime which requires the use of high-rate (non-binary) low-density parity check codes.
arXiv Detail & Related papers (2021-03-30T18:02:55Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.