Improved finite-size effects in QKD protocols with applications to decoy-state QKD
- URL: http://arxiv.org/abs/2502.05382v1
- Date: Fri, 07 Feb 2025 23:37:50 GMT
- Title: Improved finite-size effects in QKD protocols with applications to decoy-state QKD
- Authors: Lars Kamin, Devashish Tupkary, Norbert Lütkenhaus,
- Abstract summary: We present a finite-size security proof for generic quantum key distribution protocols against independent and identically distributed collective attacks.
We extend our proof to coherent attacks and variable-length protocols.
- Score: 0.0
- License:
- Abstract: We present a finite-size security proof for generic quantum key distribution protocols against independent and identically distributed collective attacks and extend it to coherent attacks using the postselection technique. This work introduces two significant improvements over previous results. First, we achieve tighter finite-size key rates by employing refined concentration inequalities in the acceptance testing phase. Second, we improve second-order correction terms in the key rate expression, by reducing them to scale with the number of sifted rounds rather than the total number of protocol rounds. We apply these advancements to compute finite-size key rates for a qubit and decoy-state BB84 protocol, accommodating arbitrary protocol parameters. Finally, we extend our finite-size security proof to coherent attacks and variable-length protocols and present our results for the decoy-state 4-6 protocol incorporating imperfections such as unequal intensity settings.
Related papers
- Improved finite-size key rates for discrete-modulated continuous variable quantum key distribution under coherent attacks [0.0]
We consider a prepare-and-measure CVQKD protocol, where Alice chooses from a set of four coherent states and Bob performs a heterodyne measurement.
We provide a security proof against coherent attacks in the finite-size regime, and compute the achievable key rate.
arXiv Detail & Related papers (2024-07-03T13:18:31Z) - The Road to Near-Capacity CV-QKD Reconciliation: An FEC-Agnostic Design [53.67135680812675]
A new codeword-based QKD reconciliation scheme is proposed.
Both the authenticated classical channel (ClC) and the quantum channel (QuC) are protected by separate forward error correction (FEC) coding schemes.
The proposed system makes QKD reconciliation compatible with a wide range of FEC schemes.
arXiv Detail & Related papers (2024-03-24T14:47:08Z) - Quantum Two-Way Protocol Beyond Superdense Coding: Joint Transfer of Data and Entanglement [33.2699333323263]
We introduce a generalization of one-way superdense coding to two-way communication protocols for transmitting classical bits by using entangled quantum pairs.
The proposed protocol jointly addresses the provision of entangled pairs and superdense coding, introducing an integrated approach for managing entanglement within the communication protocol.
We present the results of implementing the protocol in a computer simulation based on the NetSquid framework.
arXiv Detail & Related papers (2023-09-06T08:48:07Z) - Refined finite-size analysis of binary-modulation continuous-variable
quantum key distribution [0.562479170374811]
We extend the security proof based on complementarity, which is used in the discrete-variable QKD, to the previously developed binary-modulation CV-QKD protocols.
Notably, the key rate in the limit scales linearly against the attenuation rate, which is known to be optimal scaling but is not achieved in previous finite-size analyses.
arXiv Detail & Related papers (2023-01-09T05:11:23Z) - Exploring the Design of Adaptation Protocols for Improved Generalization
and Machine Learning Safety [33.24980750651318]
We evaluate common adaptation protocols across distributions shifts and machine learning safety metrics.
We find that protocols induce disparate trade-offs that were not apparent from prior evaluation.
Using hardness-promoting augmentations during LP and then FT with augmentations may be particularly effective for trade-off mitigation.
arXiv Detail & Related papers (2022-07-26T02:33:04Z) - Data post-processing for the one-way heterodyne protocol under
composable finite-size security [62.997667081978825]
We study the performance of a practical continuous-variable (CV) quantum key distribution protocol.
We focus on the Gaussian-modulated coherent-state protocol with heterodyne detection in a high signal-to-noise ratio regime.
This allows us to study the performance for practical implementations of the protocol and optimize the parameters connected to the steps above.
arXiv Detail & Related papers (2022-05-20T12:37:09Z) - Tight Secure Key Rates for CV-QKD with 8PSK Modulation [0.0]
We use a recent numerical security proof approach to calculate tight secure key rates in the presence of collective attacks.
We investigate the influence of radial postselection on the secure key rate.
We suggest strategies to reduce the raw key of 8PSK protocols significantly, only on the cost of a slightly lower secure key rate.
arXiv Detail & Related papers (2021-07-13T14:03:49Z) - Composably secure data processing for Gaussian-modulated continuous
variable quantum key distribution [58.720142291102135]
Continuous-variable quantum key distribution (QKD) employs the quadratures of a bosonic mode to establish a secret key between two remote parties.
We consider a protocol with homodyne detection in the general setting of composable finite-size security.
In particular, we analyze the high signal-to-noise regime which requires the use of high-rate (non-binary) low-density parity check codes.
arXiv Detail & Related papers (2021-03-30T18:02:55Z) - Round-robin differential phase-time-shifting protocol for quantum key
distribution: theory and experiment [58.03659958248968]
Quantum key distribution (QKD) allows the establishment of common cryptographic keys among distant parties.
Recently, a QKD protocol that circumvents the need for monitoring signal disturbance, has been proposed and demonstrated in initial experiments.
We derive the security proofs of the round-robin differential phase-time-shifting protocol in the collective attack scenario.
Our results show that the RRDPTS protocol can achieve higher secret key rate in comparison with the RRDPS, in the condition of high quantum bit error rate.
arXiv Detail & Related papers (2021-03-15T15:20:09Z) - Improved DIQKD protocols with finite-size analysis [2.940150296806761]
We show that positive randomness is achievable up to depolarizing noise values of $9.33%$, exceeding all previously known noise thresholds.
We also develop a modification to random-key-measurement protocols, using a pre-shared seed followed by a "seed recovery" step.
arXiv Detail & Related papers (2020-12-16T03:04:19Z) - Device-Independent Quantum Key Distribution with Random Key Basis [0.0]
Device-independent quantum key distribution (DIQKD) is the art of using untrusted devices to distribute secret keys in an insecure network.
We show that our protocol significantly improves over the original DIQKD protocol, enabling positive keys in the high noise regime for the first time.
arXiv Detail & Related papers (2020-05-06T09:57:47Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.