Quantum key distribution with unbounded pulse correlations
- URL: http://arxiv.org/abs/2402.08028v1
- Date: Mon, 12 Feb 2024 19:43:46 GMT
- Title: Quantum key distribution with unbounded pulse correlations
- Authors: Margarida Pereira, Guillermo Curr\'as-Lorenzo, Akihiro Mizutani,
Davide Rusca, Marcos Curty, Kiyoshi Tamaki
- Abstract summary: A prevalent issue in practical applications of quantum key distribution (QKD) is the emergence of correlations among the emitted signals.
We introduce a general formalism designed to extend existing security proofs to the practically relevant scenario.
This approach significantly enhances the applicability of these proofs and the robustness of QKD's implementation security.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: A prevalent issue in practical applications of quantum key distribution (QKD)
is the emergence of correlations among the emitted signals. Although recent
works have proved the security of QKD in the presence of this imperfection,
they rest on the premise that pulse correlations are of finite length. However,
this assumption is not necessarily met in practice, since the length of these
correlations could be potentially unbounded. Indeed, the first emitted pulse
could be correlated with the last one, even if very faintly. Still,
intuitively, there should exist a pulse separation threshold after which these
correlations become so small as to be essentially negligible, rendering them
inconsequential from a security standpoint. Building on this insight, we
introduce a general formalism designed to extend existing security proofs to
the practically relevant scenario in which pulse correlations have an unbounded
length. This approach significantly enhances the applicability of these proofs
and the robustness of QKD's implementation security.
Related papers
- Finite-correlation-secure quantum key distribution [6.781525278813814]
Correlation between different pulses is a nettlesome problem in quantum key distribution (QKD)<n>We propose a new protocol immune to all correlations of all dimensions, with the only requirements of non-entangled and finite-ranged correlation, and bounded vacuum probability.<n>We provide the finite-key security analysis against coherent attacks and conduct numerical simulations to see the performance.
arXiv Detail & Related papers (2025-07-15T12:17:08Z) - Modeling and Characterization of Arbitrary Order Pulse Correlations for Quantum Key Distribution [0.31410859223862103]
We introduce a simple linear model to explain pulse correlations.<n>We experimentally characterize short-range correlations and apply the proposed method to account for long-range correlations to an infinite order.
arXiv Detail & Related papers (2025-06-23T14:26:53Z) - Quantum key distribution overcoming practical correlated intensity fluctuations [11.207894122345138]
Intensity correlations between neighboring pulses open a prevalent yet often overlooked security loophole in decoy-state quantum key distribution (QKD)
We present and experimentally demonstrate an intensity-correlation-tolerant QKD protocol that mitigates the negative effect that this phenomenon has on the secret key rate.
arXiv Detail & Related papers (2025-01-23T08:56:26Z) - Enforcing Fundamental Relations via Adversarial Attacks on Input Parameter Correlations [76.2226569692207]
Correlations between input parameters play a crucial role in many scientific classification tasks.
We present a new adversarial attack algorithm called Random Distribution Shuffle Attack (RDSA)
We demonstrate the RDSA effectiveness on six classification tasks.
arXiv Detail & Related papers (2025-01-09T21:45:09Z) - Characterising higher-order phase correlations in gain-switched laser sources with application to quantum key distribution [38.00713966087315]
Multi-photon emissions in laser sources represent a serious threat for the security of quantum key distribution.<n>We introduce experimental schemes to characterise the phase probability distribution of the emitted pulses.<n>We demonstrate that an optimisation task over interferometric measures suffices in determining the impact of arbitrary order correlations.
arXiv Detail & Related papers (2024-12-04T22:06:13Z) - Relaxed Quantile Regression: Prediction Intervals for Asymmetric Noise [51.87307904567702]
Quantile regression is a leading approach for obtaining such intervals via the empirical estimation of quantiles in the distribution of outputs.
We propose Relaxed Quantile Regression (RQR), a direct alternative to quantile regression based interval construction that removes this arbitrary constraint.
We demonstrate that this added flexibility results in intervals with an improvement in desirable qualities.
arXiv Detail & Related papers (2024-06-05T13:36:38Z) - Entropy bounds for device-independent quantum key distribution with local Bell test [0.0]
One of the main challenges in device-independent quantum key distribution (DIQKD) is achieving the required Bell violation over long distances.
Recent works have explored the concept of certifying nonlocal correlations over extended distances through the use of a local Bell test.
Here, an additional quantum device is placed in close proximity to one party, using short-distance correlations to verify nonlocal behavior at long distances.
arXiv Detail & Related papers (2024-03-31T20:33:40Z) - Seeing is not Believing: Robust Reinforcement Learning against Spurious
Correlation [57.351098530477124]
We consider one critical type of robustness against spurious correlation, where different portions of the state do not have correlations induced by unobserved confounders.
A model that learns such useless or even harmful correlation could catastrophically fail when the confounder in the test case deviates from the training one.
Existing robust algorithms that assume simple and unstructured uncertainty sets are therefore inadequate to address this challenge.
arXiv Detail & Related papers (2023-07-15T23:53:37Z) - Semi-device independent nonlocality certification for near-term quantum
networks [46.37108901286964]
Bell tests are the most rigorous method for verifying entanglement in quantum networks.
If there is any signaling between the parties, then the violation of Bell inequalities can no longer be used.
We propose a semi-device independent protocol that allows us to numerically correct for effects of correlations in experimental probability distributions.
arXiv Detail & Related papers (2023-05-23T14:39:08Z) - Huber-Robust Confidence Sequences [37.16361789841549]
Confidence sequences are confidence intervals that can be sequentially tracked, and are valid at arbitrary data-dependent stopping times.
We show that the resulting confidence sequences attain the optimal width achieved in the nonsequential setting.
Since confidence sequences are a common tool used within A/B/n testing and bandits, these results open the door to sequential experimentation that is robust to outliers and adversarial corruptions.
arXiv Detail & Related papers (2023-01-23T17:29:26Z) - An Analysis of Quantile Temporal-Difference Learning [53.36758478669685]
quantile temporal-difference learning (QTD) has proven to be a key component in several successful large-scale applications of reinforcement learning.
Unlike classical TD learning, QTD updates do not approximate contraction mappings, are highly non-linear, and may have multiple fixed points.
This paper is a proof of convergence to the fixed points of a related family of dynamic programming procedures with probability 1.
arXiv Detail & Related papers (2023-01-11T13:41:56Z) - A Dynamical System View of Langevin-Based Non-Convex Sampling [44.002384711340966]
Non- sampling is a key challenge in machine learning, central to non-rate optimization in deep learning as well as to approximate its significance.
Existing guarantees typically only hold for the averaged distances rather than the more desirable last-rate iterates.
We develop a new framework that lifts the above issues by harnessing several tools from the theory systems.
arXiv Detail & Related papers (2022-10-25T09:43:36Z) - Distribution Regression with Sliced Wasserstein Kernels [45.916342378789174]
We propose the first OT-based estimator for distribution regression.
We study the theoretical properties of a kernel ridge regression estimator based on such representation.
arXiv Detail & Related papers (2022-02-08T15:21:56Z) - Interpolation can hurt robust generalization even when there is no noise [76.3492338989419]
We show that avoiding generalization through ridge regularization can significantly improve generalization even in the absence of noise.
We prove this phenomenon for the robust risk of both linear regression and classification and hence provide the first theoretical result on robust overfitting.
arXiv Detail & Related papers (2021-08-05T23:04:15Z) - Security of round-robin differential-phase-shift quantum key
distribution protocol with correlated light sources [2.538209532048867]
We prove that the RRDPS protocol is secure against any source imperfections by establishing a proof with the pulse correlations.
Our numerical simulation based on the proof shows that the long-range pulse correlation does not cause a significant impact on the key rate.
arXiv Detail & Related papers (2021-07-06T13:08:36Z) - Security of quantum key distribution with intensity correlations [0.0]
In high-speed decoy-state QKD systems, intensity correlations between succeeding pulses leak information about the users' intensity settings.
Here, we develop a technique to incorporate arbitrary intensity correlations to the security analysis of decoy-state QKD.
arXiv Detail & Related papers (2021-05-24T09:13:03Z) - Twin-field quantum key distribution with fully discrete phase
randomization [1.0312968200748116]
We propose and prove the security of a TF-QKD variant that relies exclusively on discrete phase randomisation.
Results show that it can also provide higher secret-key rates than counterpart protocols that rely on continuous phase randomisation.
arXiv Detail & Related papers (2020-08-07T15:31:18Z) - Best Arm Identification for Cascading Bandits in the Fixed Confidence
Setting [81.70513857417106]
We design and analyze CascadeBAI, an algorithm for finding the best set of $K$ items.
An upper bound on the time complexity of CascadeBAI is derived by overcoming a crucial analytical challenge.
We show, through the derivation of a lower bound on the time complexity, that the performance of CascadeBAI is optimal in some practical regimes.
arXiv Detail & Related papers (2020-01-23T16:47:52Z) - Quantum key distribution with correlated sources [1.7499351967216341]
In theory, quantum key distribution (QKD) offers information-theoretic security.
In practice, however, it does not due to discrepancies between the assumptions used in the security proofs and the behaviour of the real apparatuses.
Here, we close this gap by introducing a simple yet general method to prove the security of QKD with arbitrarily long-range pulse correlations.
arXiv Detail & Related papers (2019-08-22T09:05:17Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.