Tight scaling of key rate for differential-phase-shift quantum key distribution
- URL: http://arxiv.org/abs/2405.10033v1
- Date: Thu, 16 May 2024 12:15:18 GMT
- Title: Tight scaling of key rate for differential-phase-shift quantum key distribution
- Authors: Akihiro Mizutani, Toyohiro Tsurumaru,
- Abstract summary: We consider a type of DPS protocol in which the phase of each emitted block comprises $n$ pulses is randomized.
We reveal that the key rate is proportional to $eta1+frac1n-2$ and this rate is tight.
Our result suggests that the DPS protocol can achieve a combination of both advantages of ease of implementation and a high key generation rate.
- Score: 7.366405857677226
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: The performance of quantum key distribution (QKD) protocols is evaluated based on the ease of implementation and key generation rate. Among major protocols, the differential-phase-shift (DPS) protocol has the advantage of simple implementation using a train of coherent pulses and a passive detection unit. Unfortunately, however, its key rate is known to be at least proportional to $\eta^2$ with respect to channel transmission $\eta\to0$. If one can only prove the rate proportional to $\eta^2$ and cannot improve the analysis beyond that, then the DPS protocol will be deemed inferior to other major protocols, such as the decoy BB84 protocol. In this paper, we consider a type of DPS protocol in which the phase of each emitted block comprising $n$ pulses is randomized and significantly improve the analysis of its key rate. Specifically, we reveal that the key rate is proportional to $\eta^{1+\frac{1}{n-2}}$ and this rate is tight. This implies that the DPS protocol can achieve a key rate proportional to $\eta$ for a large number of $n$, which is the same scaling as the decoy BB84 protocol. Our result suggests that the DPS protocol can achieve a combination of both advantages of ease of implementation and a high key generation rate.
Related papers
- Device-independent quantum key distribution based on routed Bell tests [0.0]
We investigate DIQKD protocols based on a routed setup.
In these protocols, photons from the source are routed by an actively controlled switch to a nearby test device instead of the distant one.
We find that in an ideal case routed DIQKD protocols can significantly improve detection efficiency requirements, by up to $sim 30%$.
arXiv Detail & Related papers (2024-04-01T15:59:09Z) - Simple Opinion Dynamics for No-Regret Learning [38.61048016579232]
We study a cooperative multi-agent bandit setting in the distributed GOSSIP model.
We introduce and analyze families of memoryless and time-independent protocols for this setting.
For stationary reward settings, we prove for the first time that these simple protocols exhibit best-of-both-worlds behavior.
arXiv Detail & Related papers (2023-06-14T17:59:15Z) - Finite-key security analysis of differential-phase-shift quantum key
distribution [0.0]
Differential-phase-shift (DPS) quantum key distribution (QKD) is one of the major QKD protocols that can be implemented with a simple setup using a laser source and a passive detection unit.
An information-theoretic security proof of this protocol has been established in [npj Quant Inf. 5, 87] assuming the infinitely large number of emitted pulses.
We show that this obstacle can be overcome by exploiting recently found novel concentration inequality, Kato's inequality.
arXiv Detail & Related papers (2023-01-24T07:05:11Z) - New protocols for quantum key distribution with explicit upper and lower
bound on secret-key rate [0.0]
We present two new schemes for quantum key distribution (QKD) which neither require entanglement nor require an ideal single photon source.
The proposed protocols can be implemented using realistic single photon sources which are commercially available.
arXiv Detail & Related papers (2022-12-26T11:14:39Z) - Towards Semantic Communication Protocols: A Probabilistic Logic
Perspective [69.68769942563812]
We propose a semantic protocol model (SPM) constructed by transforming an NPM into an interpretable symbolic graph written in the probabilistic logic programming language (ProbLog)
By leveraging its interpretability and memory-efficiency, we demonstrate several applications such as SPM reconfiguration for collision-avoidance.
arXiv Detail & Related papers (2022-07-08T14:19:36Z) - Data post-processing for the one-way heterodyne protocol under
composable finite-size security [62.997667081978825]
We study the performance of a practical continuous-variable (CV) quantum key distribution protocol.
We focus on the Gaussian-modulated coherent-state protocol with heterodyne detection in a high signal-to-noise ratio regime.
This allows us to study the performance for practical implementations of the protocol and optimize the parameters connected to the steps above.
arXiv Detail & Related papers (2022-05-20T12:37:09Z) - BEER: Fast $O(1/T)$ Rate for Decentralized Nonconvex Optimization with
Communication Compression [37.20712215269538]
Communication efficiency has been widely recognized as the bottleneck for large-scale decentralized machine learning applications.
This paper proposes BEER, which adopts communication with gradient tracking, shows it converges at a faster rate.
arXiv Detail & Related papers (2022-01-31T16:14:09Z) - Discrete-variable quantum key distribution with homodyne detection [14.121646217925441]
We propose a protocol that combines the simplicity of quantum state preparation in DV-QKD together with the cost-effective and high-bandwidth of homodyne detectors used in CV-QKD.
Our simulation suggests that the protocol is suitable for secure and high-speed practical key distribution over distances.
arXiv Detail & Related papers (2021-09-01T17:12:28Z) - Composably secure data processing for Gaussian-modulated continuous
variable quantum key distribution [58.720142291102135]
Continuous-variable quantum key distribution (QKD) employs the quadratures of a bosonic mode to establish a secret key between two remote parties.
We consider a protocol with homodyne detection in the general setting of composable finite-size security.
In particular, we analyze the high signal-to-noise regime which requires the use of high-rate (non-binary) low-density parity check codes.
arXiv Detail & Related papers (2021-03-30T18:02:55Z) - Round-robin differential phase-time-shifting protocol for quantum key
distribution: theory and experiment [58.03659958248968]
Quantum key distribution (QKD) allows the establishment of common cryptographic keys among distant parties.
Recently, a QKD protocol that circumvents the need for monitoring signal disturbance, has been proposed and demonstrated in initial experiments.
We derive the security proofs of the round-robin differential phase-time-shifting protocol in the collective attack scenario.
Our results show that the RRDPTS protocol can achieve higher secret key rate in comparison with the RRDPS, in the condition of high quantum bit error rate.
arXiv Detail & Related papers (2021-03-15T15:20:09Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.