Finite and Asymptotic Key Analysis for CubeSat-Based BB84 QKD with Elliptical Beam Approximation
- URL: http://arxiv.org/abs/2501.15148v1
- Date: Sat, 25 Jan 2025 09:12:56 GMT
- Title: Finite and Asymptotic Key Analysis for CubeSat-Based BB84 QKD with Elliptical Beam Approximation
- Authors: Muskan, Arindam Dutta, Subhashish Banerjee,
- Abstract summary: Satellite and CubeSat-based quantum key distribution (QKD) presents a promising solution for secure long-distance communication.
This study investigates the performance of statistical techniques used to compute the finite-block and single-pass secret key lengths.
An efficient BB84 protocol consistently outperforms the standard version across different atmospheric conditions.
- Score: 0.0
- License:
- Abstract: Satellite and CubeSat-based quantum key distribution (QKD) presents a promising solution for secure long-distance communication by transmitting quantum keys through free space, with CubeSats offering a compact, cost-effective, and scalable platform for deployment. This study investigates the performance of statistical techniques used to compute the finite-block and single-pass secret key lengths (SKL) for weak coherent pulse (WCP)-based efficient BB84 and standard decoy-state BB84 protocols in CubeSat-based systems. An asymptotic key rate analysis is also conducted for both protocols, providing deeper insights into their theoretical performance within the CubeSat context. The channel transmittance is modeled using an elliptical beam approximation, and the key rate performance is evaluated under varying weather conditions for the downlink scenario. The results demonstrate that the efficient BB84 protocol consistently outperforms the standard version across different atmospheric conditions. Furthermore, the probability distribution of key rates (PDR) for both implementations is analyzed, offering a comprehensive evaluation of their practical effectiveness in CubeSat-based QKD applications.
Related papers
- Satellite-based communication for phase-matching measurement-device-independent quantum key distribution [0.0]
PM-MDI QKD protocol proposed by Lin and L"utkenhaus for satellite-based quantum communication.
The protocol's key rate, known to exceed the repeaterless bound, is evaluated in the limit under noisy conditions.
Findings demonstrate the potential of PM-MDI QKD protocols for achieving reliable key rates in satellite-based quantum communication.
arXiv Detail & Related papers (2025-01-10T10:07:44Z) - Asymmetric protocols for mode pairing quantum key distribution with finite-key analysis [5.323964523588455]
We conduct a security analysis of asymmetric MP-QKD protocol with the finite-key analysis.
Our work can achieve significantly enhanced secure key rates and transmission distances compared to the original strategy.
arXiv Detail & Related papers (2024-12-17T06:50:15Z) - Performance of Cascade and LDPC-codes for Information Reconciliation on Industrial Quantum Key Distribution Systems [69.47813697920358]
We analyze, simulate, optimize, and compare the performance of two prevalent algorithms used for Information Reconciliation.
We focus on their applicability in practical and industrial settings, operating in realistic and application-close conditions.
arXiv Detail & Related papers (2024-08-28T12:51:03Z) - Blockwise Key Distillation in Satellite-based Quantum Key Distribution [68.8891637551539]
We compare two key distillation techniques for satellite-based quantum key distribution.
One is the traditional em non-blockwise strategy that treats all the signals as a whole.
The other is a em blockwise strategy that divides the signals into individual blocks that have similar noise characteristics and processes them independently.
arXiv Detail & Related papers (2023-07-10T01:34:58Z) - Practical quantum secure direct communication with squeezed states [55.41644538483948]
We report the first table-top experimental demonstration of a CV-QSDC system and assess its security.
This realization paves the way into future threat-less quantum metropolitan networks, compatible with coexisting advanced wavelength division multiplexing (WDM) systems.
arXiv Detail & Related papers (2023-06-25T19:23:42Z) - Data post-processing for the one-way heterodyne protocol under
composable finite-size security [62.997667081978825]
We study the performance of a practical continuous-variable (CV) quantum key distribution protocol.
We focus on the Gaussian-modulated coherent-state protocol with heterodyne detection in a high signal-to-noise ratio regime.
This allows us to study the performance for practical implementations of the protocol and optimize the parameters connected to the steps above.
arXiv Detail & Related papers (2022-05-20T12:37:09Z) - Simple and practical DIQKD security analysis via BB84-type uncertainty
relations and Pauli correlation constraints [0.0]
In this work, we describe how the conditional entropy can be bounded in the 2-input/2-output setting.
We illustrate the approach on a variant of the device-independent CHSH QKD protocol where both bases are used to generate the key.
arXiv Detail & Related papers (2021-07-19T14:08:43Z) - Composably secure data processing for Gaussian-modulated continuous
variable quantum key distribution [58.720142291102135]
Continuous-variable quantum key distribution (QKD) employs the quadratures of a bosonic mode to establish a secret key between two remote parties.
We consider a protocol with homodyne detection in the general setting of composable finite-size security.
In particular, we analyze the high signal-to-noise regime which requires the use of high-rate (non-binary) low-density parity check codes.
arXiv Detail & Related papers (2021-03-30T18:02:55Z) - Round-robin differential phase-time-shifting protocol for quantum key
distribution: theory and experiment [58.03659958248968]
Quantum key distribution (QKD) allows the establishment of common cryptographic keys among distant parties.
Recently, a QKD protocol that circumvents the need for monitoring signal disturbance, has been proposed and demonstrated in initial experiments.
We derive the security proofs of the round-robin differential phase-time-shifting protocol in the collective attack scenario.
Our results show that the RRDPTS protocol can achieve higher secret key rate in comparison with the RRDPS, in the condition of high quantum bit error rate.
arXiv Detail & Related papers (2021-03-15T15:20:09Z) - A polarization quantum key distribution scheme based on phase matching [0.0]
The Quantum Key Distribution protocol can encode a single quantum state and implements an information-theoretically secure key distribution protocol in communication.
This paper successfully gives the polarization scheme of this PM-QKD protocol, the bases in the polarization scheme are arbitrary, and eliminates detector side channel attacks.
The simulation results show that our protocol is superior to the BB84 protocol in terms of transmission distance under the fixed key rate.
arXiv Detail & Related papers (2020-03-02T10:33:18Z) - Tight security bounds for decoy-state quantum key distribution [1.1563829079760959]
The BB84 quantum key distribution (QKD) combined with decoy-state method is currently the most practical protocol.
Here, we provide the rigorous and optimal analytic formula to solve the above tasks.
Our results can be widely applied to deal with statistical fluctuation in quantum cryptography protocols.
arXiv Detail & Related papers (2020-02-16T07:48:25Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.