Finite-size security of continuous-variable quantum key distribution with imperfect heterodyne measurement
- URL: http://arxiv.org/abs/2501.10278v1
- Date: Fri, 17 Jan 2025 16:12:47 GMT
- Title: Finite-size security of continuous-variable quantum key distribution with imperfect heterodyne measurement
- Authors: Adnan A. E. Hajomer, Akash Nag Oruganti, Ivan Derkach, Ulrik L Andersen, Vladyslav C Usenko, Tobias Gehring,
- Abstract summary: Continuous-variable quantum key distribution (CVQKD) using coherent states and heterodyne detection enables secure quantum communication based on technology that has large similarities to coherent optical telecommunication.
Here, we present a theoretical framework that rigorously accounts for imperfect heterodyne measurements arising from phase imbalances in the coherent (heterodyne) receiver.
We validate our approach experimentally on a CVQKD system with an imperfect coherent receiver, underscoring its potential for scalable, cost-effective CVQKD with photonic integrated receivers in which phase-imbalances naturally appear through manufacturing tolerances.
- Score: 0.0
- License:
- Abstract: Continuous-variable quantum key distribution (CVQKD) using coherent states and heterodyne detection enables secure quantum communication based on technology that has large similarities to coherent optical telecommunication. Yet, practical implementations of coherent receivers used in both technologies encounter device imperfections, which for CVQKD are often not addressed in security proofs. Here, we present a theoretical framework that rigorously accounts for imperfect heterodyne measurements arising from phase imbalances in the coherent (heterodyne) receiver. Focusing on collective attacks, we establish a finite-size security proof that reveals how measurement imperfections limit the distance over which a positive key rate is achievable. To mitigate these effects, we propose a local transformation during classical post-processing. We validate our approach experimentally on a CVQKD system with an imperfect coherent receiver, underscoring its potential for scalable, cost-effective CVQKD with photonic integrated receivers in which phase-imbalances naturally appear through manufacturing tolerances.
Related papers
- A Passive and Self-Characterizing Cross-Encoded Receiver for Reference-Frame-Independent Quantum Key Distribution [0.0]
Quantum Key Distribution (QKD) promises to revolutionize the field of security in communication.
RFI-QKD aims to simplify QKD implementations by allowing to reduce the requirements of alignment on a shared reference frame.
We present a novel fully passive receiver for time-bin encoded RFI-QKD.
arXiv Detail & Related papers (2024-08-30T14:00:27Z) - Practical quantum secure direct communication with squeezed states [55.41644538483948]
We report the first table-top experimental demonstration of a CV-QSDC system and assess its security.
This realization paves the way into future threat-less quantum metropolitan networks, compatible with coexisting advanced wavelength division multiplexing (WDM) systems.
arXiv Detail & Related papers (2023-06-25T19:23:42Z) - Robust and efficient verification of graph states in blind
measurement-based quantum computation [52.70359447203418]
Blind quantum computation (BQC) is a secure quantum computation method that protects the privacy of clients.
It is crucial to verify whether the resource graph states are accurately prepared in the adversarial scenario.
Here, we propose a robust and efficient protocol for verifying arbitrary graph states with any prime local dimension.
arXiv Detail & Related papers (2023-05-18T06:24:45Z) - Single-photon-memory measurement-device-independent quantum secure
direct communication [63.75763893884079]
Quantum secure direct communication (QSDC) uses the quantum channel to transmit information reliably and securely.
In order to eliminate the security loopholes resulting from practical detectors, the measurement-device-independent (MDI) QSDC protocol has been proposed.
We propose a single-photon-memory MDI QSDC protocol (SPMQC) for dispensing with high-performance quantum memory.
arXiv Detail & Related papers (2022-12-12T02:23:57Z) - Finite-size security proof of binary-modulation continuous-variable
quantum key distribution using only heterodyne measurement [0.9786690381850356]
Continuous-variable quantum key distribution (CV-QKD) has many practical advantages including compatibility with current optical communication technology.
We propose an all-heterodyne CV-QKD protocol with binary modulation and prove its security against general attacks in the finite-key regime.
arXiv Detail & Related papers (2022-08-25T10:27:27Z) - Experimental measurement-device-independent type quantum key
distribution with flawed and correlated sources [14.143874849657317]
Security of quantum key distribution (QKD) is threatened by discrepancies between realistic devices and theoretical assumptions.
Here, we adopt the reference technique to prove security of an efficient four-phase measurement-device-independent QKD using laser pulses against potential source imperfections.
In addition, we demonstrate the feasibility of our protocol through a proof-of-principle experimental implementation and achieve a secure key rate of 253 bps with a 20 dB channel loss.
arXiv Detail & Related papers (2022-04-18T13:44:51Z) - Measurement based estimator scheme for continuous quantum error
correction [52.77024349608834]
Canonical discrete quantum error correction (DQEC) schemes use projective von Neumann measurements on stabilizers to discretize the error syndromes into a finite set.
Quantum error correction (QEC) based on continuous measurement, known as continuous quantum error correction (CQEC), can be executed faster than DQEC and can also be resource efficient.
We show that by constructing a measurement-based estimator (MBE) of the logical qubit to be protected, it is possible to accurately track the errors occurring on the physical qubits in real time.
arXiv Detail & Related papers (2022-03-25T09:07:18Z) - Crosstalk Suppression for Fault-tolerant Quantum Error Correction with
Trapped Ions [62.997667081978825]
We present a study of crosstalk errors in a quantum-computing architecture based on a single string of ions confined by a radio-frequency trap, and manipulated by individually-addressed laser beams.
This type of errors affects spectator qubits that, ideally, should remain unaltered during the application of single- and two-qubit quantum gates addressed at a different set of active qubits.
We microscopically model crosstalk errors from first principles and present a detailed study showing the importance of using a coherent vs incoherent error modelling and, moreover, discuss strategies to actively suppress this crosstalk at the gate level.
arXiv Detail & Related papers (2020-12-21T14:20:40Z) - Efficient and robust certification of genuine multipartite entanglement
in noisy quantum error correction circuits [58.720142291102135]
We introduce a conditional witnessing technique to certify genuine multipartite entanglement (GME)
We prove that the detection of entanglement in a linear number of bipartitions by a number of measurements scales linearly, suffices to certify GME.
We apply our method to the noisy readout of stabilizer operators of the distance-three topological color code and its flag-based fault-tolerant version.
arXiv Detail & Related papers (2020-10-06T18:00:07Z) - Finite-size security of continuous-variable quantum key distribution
with digital signal processing [1.0499611180329804]
We propose a tight and robust method of estimating fidelity of an optical pulse to a coherent state via heterodyne measurements.
We then construct a binary phase CV QKD protocol and prove its security in the finite-key-size regime against general coherent attacks.
arXiv Detail & Related papers (2020-06-08T15:03:39Z) - Security of quantum key distribution with detection-efficiency mismatch
in the multiphoton case [0.0]
Current security of QKD with detection-efficiency mismatch rely on the assumption of the single-photon light source on the sender side or on the assumption of the single-photon input of the receiver side.
Here we present a rigorous security proof without these assumptions and, thus, solve this important problem and prove the security of QKD with detection-efficiency mismatch against general attacks.
arXiv Detail & Related papers (2020-04-16T17:55:30Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.