Entropy bounds for device-independent quantum key distribution with local Bell test
- URL: http://arxiv.org/abs/2404.00792v2
- Date: Thu, 10 Oct 2024 01:41:26 GMT
- Title: Entropy bounds for device-independent quantum key distribution with local Bell test
- Authors: Ernest Y. -Z. Tan, Ramona Wolf,
- Abstract summary: One of the main challenges in device-independent quantum key distribution (DIQKD) is achieving the required Bell violation over long distances.
Recent works have explored the concept of certifying nonlocal correlations over extended distances through the use of a local Bell test.
Here, an additional quantum device is placed in close proximity to one party, using short-distance correlations to verify nonlocal behavior at long distances.
- Score: 0.0
- License:
- Abstract: One of the main challenges in device-independent quantum key distribution (DIQKD) is achieving the required Bell violation over long distances, as the channel losses result in low overall detection efficiencies. Recent works have explored the concept of certifying nonlocal correlations over extended distances through the use of a local Bell test. Here, an additional quantum device is placed in close proximity to one party, using short-distance correlations to verify nonlocal behavior at long distances. However, existing works have either not resolved the question of DIQKD security against active attackers in this setup, or used methods that do not yield tight bounds on the keyrates. In this work, we introduce a general formulation of the keyrate computation task in this setup that can be combined with recently developed methods for analyzing standard DIQKD. Using this method, we show that if the short-distance devices exhibit sufficiently high detection efficiencies, positive keyrates can be achieved in the long-distance branch with lower detection efficiencies as compared to standard DIQKD setups. This highlights the potential for improved performance of DIQKD over extended distances in scenarios where short-distance correlations are leveraged to validate quantum correlations.
Related papers
- Device-independent quantum key distribution based on routed Bell tests [0.0]
We investigate DIQKD protocols based on a routed setup.
In these protocols, photons from the source are routed by an actively controlled switch to a nearby test device instead of the distant one.
We find that in an ideal case routed DIQKD protocols can significantly improve detection efficiency requirements, by up to $sim 30%$.
arXiv Detail & Related papers (2024-04-01T15:59:09Z) - One-sided DI-QKD secure against coherent attacks over long distances [0.0]
Device-Independent (DI) QKD protocols overcome this issue by making minimal device assumptions.
We show that a one-sided DI QKD scheme with two measurements per party is secure against coherent attacks up to detection efficiencies greater than 50.1% specifically on the untrusted side.
We also show that, by placing the source of states close to the untrusted side, our protocol is secure over distances comparable to standard QKD protocols.
arXiv Detail & Related papers (2024-03-18T15:01:17Z) - Device-Independent Quantum Key Distribution beyond qubits [0.0]
Device-Independent Quantum Key Distribution (DIQKD) aims to generate secret keys between two parties without relying on trust in their employed devices.
This study explores the resilience of high-dimensional quantum systems in DIQKD, focusing on a comparison between qubits and qutrits.
arXiv Detail & Related papers (2024-01-31T20:36:48Z) - Semi-device independent nonlocality certification for near-term quantum
networks [46.37108901286964]
Bell tests are the most rigorous method for verifying entanglement in quantum networks.
If there is any signaling between the parties, then the violation of Bell inequalities can no longer be used.
We propose a semi-device independent protocol that allows us to numerically correct for effects of correlations in experimental probability distributions.
arXiv Detail & Related papers (2023-05-23T14:39:08Z) - Upper bounds on key rates in device-independent quantum key distribution
based on convex-combination attacks [1.118478900782898]
We present the convex-combination attack as an efficient, easy-to-use technique for upper-bounding DIQKD key rates.
It allows verifying the accuracy of lower bounds on key rates for state-of-the-art protocols.
arXiv Detail & Related papers (2022-06-13T15:27:48Z) - Data post-processing for the one-way heterodyne protocol under
composable finite-size security [62.997667081978825]
We study the performance of a practical continuous-variable (CV) quantum key distribution protocol.
We focus on the Gaussian-modulated coherent-state protocol with heterodyne detection in a high signal-to-noise ratio regime.
This allows us to study the performance for practical implementations of the protocol and optimize the parameters connected to the steps above.
arXiv Detail & Related papers (2022-05-20T12:37:09Z) - Towards fully-fledged quantum and classical communication over deployed
fiber with up-conversion module [47.187609203210705]
We propose and demonstrate a new method, based on up-conversion assisted receiver, for co-propagating classical light and QKD signals.
Our proposal exhibits higher tolerance for noise in comparison to the standard receiver, thus enabling the distribution of secret keys in the condition of 4 dB-higher classical power.
arXiv Detail & Related papers (2021-06-09T13:52:27Z) - Composably secure data processing for Gaussian-modulated continuous
variable quantum key distribution [58.720142291102135]
Continuous-variable quantum key distribution (QKD) employs the quadratures of a bosonic mode to establish a secret key between two remote parties.
We consider a protocol with homodyne detection in the general setting of composable finite-size security.
In particular, we analyze the high signal-to-noise regime which requires the use of high-rate (non-binary) low-density parity check codes.
arXiv Detail & Related papers (2021-03-30T18:02:55Z) - Round-robin differential phase-time-shifting protocol for quantum key
distribution: theory and experiment [58.03659958248968]
Quantum key distribution (QKD) allows the establishment of common cryptographic keys among distant parties.
Recently, a QKD protocol that circumvents the need for monitoring signal disturbance, has been proposed and demonstrated in initial experiments.
We derive the security proofs of the round-robin differential phase-time-shifting protocol in the collective attack scenario.
Our results show that the RRDPTS protocol can achieve higher secret key rate in comparison with the RRDPS, in the condition of high quantum bit error rate.
arXiv Detail & Related papers (2021-03-15T15:20:09Z) - Sending or not sending twin-field quantum key distribution with
distinguishable decoy states [10.66830089114367]
We find the external modulation of different intensity states through the test, required in those TF-QKD with post-phase compensation, shows a side channel in frequency domain.
We propose a complete and undetected eavesdropping attack, named passive frequency shift attack, on sending or not-sending TF-QKD protocol.
Our results emphasize the importance of practical security at source and might provide a valuable reference for the practical implementation of TF-QKD.
arXiv Detail & Related papers (2021-01-27T09:37:41Z) - Crosstalk Suppression for Fault-tolerant Quantum Error Correction with
Trapped Ions [62.997667081978825]
We present a study of crosstalk errors in a quantum-computing architecture based on a single string of ions confined by a radio-frequency trap, and manipulated by individually-addressed laser beams.
This type of errors affects spectator qubits that, ideally, should remain unaltered during the application of single- and two-qubit quantum gates addressed at a different set of active qubits.
We microscopically model crosstalk errors from first principles and present a detailed study showing the importance of using a coherent vs incoherent error modelling and, moreover, discuss strategies to actively suppress this crosstalk at the gate level.
arXiv Detail & Related papers (2020-12-21T14:20:40Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.