Trusted source noise model of discrete-modulated continuous-variable quantum key distribution
- URL: http://arxiv.org/abs/2407.20302v1
- Date: Mon, 29 Jul 2024 10:35:33 GMT
- Title: Trusted source noise model of discrete-modulated continuous-variable quantum key distribution
- Authors: Mingze Wu, Junhui Li, Bingjie Xu, Song Yu, Yichen Zhang,
- Abstract summary: discrete-modulated continuous-variable quantum key distribution.
Traditional approach is to assume that eavesdroppers can control all of the source noise.
We tailor a trusted model specifically for the discrete-modulated protocol and upgrade the security analysis accordingly.
- Score: 8.019408649120262
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Discrete-modulated continuous-variable quantum key distribution offers a pragmatic solution, greatly simplifying experimental procedures while retaining robust integration with classical optical communication. Theoretical analyses have progressively validated the comprehensive security of this protocol, paving the way for practical experimentation. However, imperfect source in practical implementations introduce noise. The traditional approach is to assume that eavesdroppers can control all of the source noise, which overestimates the ability of eavesdroppers and underestimates secret key rate. In fact, some parts of source noise are intrinsic and cannot be manipulated by eavesdropper, so they can be seen as trusted noise. We tailor a trusted model specifically for the discrete-modulated protocol and upgrade the security analysis accordingly. Simulation results demonstrate that this approach successfully mitigates negative impact of imperfect source on system performance while maintaining security of the protocol. Furthermore, our method can be used in conjunction with trusted detector noise model, effectively reducing the influence of both source and detector noise in experimental setup. This is a meaningful contribution to the practical deployment of discrete-modulated continuous-variable quantum key distribution systems.
Related papers
- General treatment of Gaussian trusted noise in continuous variable
quantum key distribution [1.0499611180329804]
A trusted device scenario assumes that an adversary has no access to imperfections such as electronic noises in the detector is expected to provide significant improvement in the key rate.
Here, we develop a simple and general treatment that can incorporate the effects of Gaussian trusted noises for any protocol that uses homodyne/heterodyne measurements.
In our method, a rescaling of the outcome of a noisy homodyne/heterodyne detector renders it equivalent to the outcome of a noiseless detector with a tiny additional loss.
arXiv Detail & Related papers (2023-05-28T10:38:36Z) - Improve Noise Tolerance of Robust Loss via Noise-Awareness [60.34670515595074]
We propose a meta-learning method which is capable of adaptively learning a hyper parameter prediction function, called Noise-Aware-Robust-Loss-Adjuster (NARL-Adjuster for brevity)
Four SOTA robust loss functions are attempted to be integrated with our algorithm, and comprehensive experiments substantiate the general availability and effectiveness of the proposed method in both its noise tolerance and performance.
arXiv Detail & Related papers (2023-01-18T04:54:58Z) - Robust Control for Dynamical Systems With Non-Gaussian Noise via Formal
Abstractions [59.605246463200736]
We present a novel controller synthesis method that does not rely on any explicit representation of the noise distributions.
First, we abstract the continuous control system into a finite-state model that captures noise by probabilistic transitions between discrete states.
We use state-of-the-art verification techniques to provide guarantees on the interval Markov decision process and compute a controller for which these guarantees carry over to the original control system.
arXiv Detail & Related papers (2023-01-04T10:40:30Z) - Data post-processing for the one-way heterodyne protocol under
composable finite-size security [62.997667081978825]
We study the performance of a practical continuous-variable (CV) quantum key distribution protocol.
We focus on the Gaussian-modulated coherent-state protocol with heterodyne detection in a high signal-to-noise ratio regime.
This allows us to study the performance for practical implementations of the protocol and optimize the parameters connected to the steps above.
arXiv Detail & Related papers (2022-05-20T12:37:09Z) - Sampling-Based Robust Control of Autonomous Systems with Non-Gaussian
Noise [59.47042225257565]
We present a novel planning method that does not rely on any explicit representation of the noise distributions.
First, we abstract the continuous system into a discrete-state model that captures noise by probabilistic transitions between states.
We capture these bounds in the transition probability intervals of a so-called interval Markov decision process (iMDP)
arXiv Detail & Related papers (2021-10-25T06:18:55Z) - Homodyne Detection Quadrature Phase Shift Keying Continuous-Variable
Quantum Key Distribution with High Excess Noise Tolerance [7.87972015113057]
We propose a homodyne detection protocol using the quadrature phase shift keying technique.
By limiting information leakage, our proposed protocol enhances excess noise tolerance to a high level.
Our results imply that the current protocol is able to distribute keys in nearly intercity area.
arXiv Detail & Related papers (2021-04-22T16:10:35Z) - Composably secure data processing for Gaussian-modulated continuous
variable quantum key distribution [58.720142291102135]
Continuous-variable quantum key distribution (QKD) employs the quadratures of a bosonic mode to establish a secret key between two remote parties.
We consider a protocol with homodyne detection in the general setting of composable finite-size security.
In particular, we analyze the high signal-to-noise regime which requires the use of high-rate (non-binary) low-density parity check codes.
arXiv Detail & Related papers (2021-03-30T18:02:55Z) - Modulation leakage vulnerability in continuous-variable quantum key
distribution [0.5863360388454261]
We report a modulation leakage vulnerability in a quantum key distribution system.
The leakage arises from the limited suppression of a quantum-information-carrying sideband during modulation.
Our results indicate that the leakage reduces the range over which a positive secret key can be obtained, and can even lead to a security breach.
arXiv Detail & Related papers (2021-03-26T16:28:08Z) - Efficient and robust certification of genuine multipartite entanglement
in noisy quantum error correction circuits [58.720142291102135]
We introduce a conditional witnessing technique to certify genuine multipartite entanglement (GME)
We prove that the detection of entanglement in a linear number of bipartitions by a number of measurements scales linearly, suffices to certify GME.
We apply our method to the noisy readout of stabilizer operators of the distance-three topological color code and its flag-based fault-tolerant version.
arXiv Detail & Related papers (2020-10-06T18:00:07Z) - Trusted detector noise analysis for discrete modulation schemes of
continuous-variable quantum key distribution [4.977851927269835]
Discrete-modulated continuous-variable quantum key distribution protocols are promising candidates for large-scale deployment.
We calculate key rates against collective attacks in the trusted detector noise scenario.
Our results show that we can thus cut out most of the effect of detector noise and obtain key rates similar to those had we access to ideal detectors.
arXiv Detail & Related papers (2020-06-11T03:11:36Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.