Practical No-Switching Continuous-Variable Quantum Key Distribution with
Biased Quadrature Detection
- URL: http://arxiv.org/abs/2402.00277v1
- Date: Thu, 1 Feb 2024 02:02:56 GMT
- Title: Practical No-Switching Continuous-Variable Quantum Key Distribution with
Biased Quadrature Detection
- Authors: Jiale Mi, Yiming Bian, Lu Fan, Song Yu, Yichen Zhang
- Abstract summary: The security of an ideal No-Switching protocol has been proved against general attacks in finite-size regime and composable security framework.
We propose a modified No-Switching protocol with biased quadrature detection, where the asymmetry of the heterodyne detection is modeled to match the practical systems.
An optimization strategy is proposed to achieve the optimal secret key rate by adjusting the transmittance of the beam splitter.
- Score: 4.559900583044687
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Continuous-variable quantum key distribution protocol using coherent states
and heterodyne detection, called No-Switching protocol, is widely used in
practical systems due to the simple experimental setup without basis switching
and easy assessment to phase information. The security of an ideal No-Switching
protocol has been proved against general attacks in finite-size regime and
composable security framework, whose heterodyne detector consists of a beam
splitter with transmittance of $50\%$ and two ideal homodyne detectors.
However, the transmittance of a beam splitter is inaccurate and the two
detectors always have different quantum efficiency and electronic noise, which
introduce asymmetry into the heterodyne detection, and further lead to the
mismatch between the ideal protocol and practical systems, thereby
overestimating the secret key rate and resulting in a practical security
loophole. In this paper, we close this loophole by proposing a modified
No-Switching protocol with biased quadrature detection, where the asymmetry of
the heterodyne detection is modeled to match the practical systems, and the
security of the protocol is analyzed in asymptotic and finite-size regimes.
Further, an optimization strategy is proposed to achieve the optimal secret key
rate by adjusting the transmittance of the beam splitter. Simulation results
show the necessity of considering the asymmetry in heterodyne detection and the
effectiveness of the optimization, which provides a promising way to realize a
practical secure and high-performance No-Switching system.
Related papers
- Pilot-reference-free continuous-variable quantum key distribution with
efficient decoy-state analysis [4.738999541025475]
Continuous-variable quantum key distribution (CV QKD) using optical coherent detectors is practically favorable.
Security analysis and parameter estimation of CV QKD are complicated due to the infinite-dimensional latent Hilbert space.
We present a time-bin-encoding CV protocol with a simple phase-error-based security analysis valid under general coherent attacks.
arXiv Detail & Related papers (2023-09-07T15:40:05Z) - Monte Carlo approach to the evaluation of the security of
device-independent quantum key distribution [0.16317061277456998]
We present a generic study on the information-theoretic security of multi-setting device-independent quantum key distribution protocols.
The approach we develop yields nontrivial upper bounds on the secure key rates, along with the detection efficiencies required upon the measuring devices.
arXiv Detail & Related papers (2023-08-06T06:07:06Z) - General treatment of Gaussian trusted noise in continuous variable
quantum key distribution [1.0499611180329804]
A trusted device scenario assumes that an adversary has no access to imperfections such as electronic noises in the detector is expected to provide significant improvement in the key rate.
Here, we develop a simple and general treatment that can incorporate the effects of Gaussian trusted noises for any protocol that uses homodyne/heterodyne measurements.
In our method, a rescaling of the outcome of a noisy homodyne/heterodyne detector renders it equivalent to the outcome of a noiseless detector with a tiny additional loss.
arXiv Detail & Related papers (2023-05-28T10:38:36Z) - Finite-size security proof of binary-modulation continuous-variable
quantum key distribution using only heterodyne measurement [0.9786690381850356]
Continuous-variable quantum key distribution (CV-QKD) has many practical advantages including compatibility with current optical communication technology.
We propose an all-heterodyne CV-QKD protocol with binary modulation and prove its security against general attacks in the finite-key regime.
arXiv Detail & Related papers (2022-08-25T10:27:27Z) - Data post-processing for the one-way heterodyne protocol under
composable finite-size security [62.997667081978825]
We study the performance of a practical continuous-variable (CV) quantum key distribution protocol.
We focus on the Gaussian-modulated coherent-state protocol with heterodyne detection in a high signal-to-noise ratio regime.
This allows us to study the performance for practical implementations of the protocol and optimize the parameters connected to the steps above.
arXiv Detail & Related papers (2022-05-20T12:37:09Z) - Fault-tolerant parity readout on a shuttling-based trapped-ion quantum
computer [64.47265213752996]
We experimentally demonstrate a fault-tolerant weight-4 parity check measurement scheme.
We achieve a flag-conditioned parity measurement single-shot fidelity of 93.2(2)%.
The scheme is an essential building block in a broad class of stabilizer quantum error correction protocols.
arXiv Detail & Related papers (2021-07-13T20:08:04Z) - Homodyne Detection Quadrature Phase Shift Keying Continuous-Variable
Quantum Key Distribution with High Excess Noise Tolerance [7.87972015113057]
We propose a homodyne detection protocol using the quadrature phase shift keying technique.
By limiting information leakage, our proposed protocol enhances excess noise tolerance to a high level.
Our results imply that the current protocol is able to distribute keys in nearly intercity area.
arXiv Detail & Related papers (2021-04-22T16:10:35Z) - Composably secure data processing for Gaussian-modulated continuous
variable quantum key distribution [58.720142291102135]
Continuous-variable quantum key distribution (QKD) employs the quadratures of a bosonic mode to establish a secret key between two remote parties.
We consider a protocol with homodyne detection in the general setting of composable finite-size security.
In particular, we analyze the high signal-to-noise regime which requires the use of high-rate (non-binary) low-density parity check codes.
arXiv Detail & Related papers (2021-03-30T18:02:55Z) - Round-robin differential phase-time-shifting protocol for quantum key
distribution: theory and experiment [58.03659958248968]
Quantum key distribution (QKD) allows the establishment of common cryptographic keys among distant parties.
Recently, a QKD protocol that circumvents the need for monitoring signal disturbance, has been proposed and demonstrated in initial experiments.
We derive the security proofs of the round-robin differential phase-time-shifting protocol in the collective attack scenario.
Our results show that the RRDPTS protocol can achieve higher secret key rate in comparison with the RRDPS, in the condition of high quantum bit error rate.
arXiv Detail & Related papers (2021-03-15T15:20:09Z) - Automatic Extrinsic Calibration Method for LiDAR and Camera Sensor
Setups [68.8204255655161]
We present a method to calibrate the parameters of any pair of sensors involving LiDARs, monocular or stereo cameras.
The proposed approach can handle devices with very different resolutions and poses, as usually found in vehicle setups.
arXiv Detail & Related papers (2021-01-12T12:02:26Z) - Efficient and robust certification of genuine multipartite entanglement
in noisy quantum error correction circuits [58.720142291102135]
We introduce a conditional witnessing technique to certify genuine multipartite entanglement (GME)
We prove that the detection of entanglement in a linear number of bipartitions by a number of measurements scales linearly, suffices to certify GME.
We apply our method to the noisy readout of stabilizer operators of the distance-three topological color code and its flag-based fault-tolerant version.
arXiv Detail & Related papers (2020-10-06T18:00:07Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.