High-rate discrete-modulated continuous-variable quantum key distribution with composable security
- URL: http://arxiv.org/abs/2503.11431v1
- Date: Fri, 14 Mar 2025 14:21:08 GMT
- Title: High-rate discrete-modulated continuous-variable quantum key distribution with composable security
- Authors: Mingze Wu, Yan Pan, Junhui Li, Heng Wang, Lu Fan, Yun Shao, Yang Li, Wei Huang, Song Yu, Bingjie Xu, Yichen Zhang,
- Abstract summary: We report a continuous-variable quantum key distribution system with a composable secret key rate of 18.93 Mbps against collective attacks over a 25 km fiber channel.<n>This record-breaking rate is achieved through the probability shaped 16QAM-modulated protocol, which employs semidefinite programming to ensure its composable security.
- Score: 17.348175817014234
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Continuous-variable quantum key distribution holds the potential to generate high secret key rates, making it a prime candidate for high-rate metropolitan quantum network applications. However, despite these promising opportunities, the realization of high-rate continuous-variable quantum key distribution systems with composable security remains an elusive goal. Here, we report a discrete-modulated continuous-variable quantum key distribution system with a composable secret key rate of 18.93 Mbps against collective attacks over a 25 km fiber channel. This record-breaking rate is achieved through the probability shaped 16QAM-modulated protocol, which employs semidefinite programming to ensure its composable security. Furthermore, we have employed a fully digital and precise quantum signal processing technique to reduce excess noise to extremely low levels, thereby facilitating efficient broadband system operation. While ensuring low complexity and cost, our system achieves a performance advantage of over an order of magnitude compared to previous continuous-variable quantum key distribution systems, providing a promising solution for future deployment of quantum key distribution.
Related papers
- High-rate discrete-modulated continuous-variable quantum key distribution with composable security [17.348175817014234]
We report a discrete-modulated continuous-variable quantum key distribution system with a composable secret key rate of 18.93 Mbps against collective attacks over a 25 km fiber channel.
This record breaking rate is achieved through the probability shaped 16QAM-modulated protocol, which employs semidefinite programming to ensure its composable security.
arXiv Detail & Related papers (2025-03-19T03:59:19Z) - Practical hybrid PQC-QKD protocols with enhanced security and performance [44.8840598334124]
We develop hybrid protocols by which QKD and PQC inter-operate within a joint quantum-classical network.
In particular, we consider different hybrid designs that may offer enhanced speed and/or security over the individual performance of either approach.
arXiv Detail & Related papers (2024-11-02T00:02:01Z) - Towards efficient and secure quantum-classical communication networks [47.27205216718476]
There are two primary approaches to achieving quantum-resistant security: quantum key distribution (QKD) and post-quantum cryptography (PQC)
We introduce the pros and cons of these protocols and explore how they can be combined to achieve a higher level of security and/or improved performance in key distribution.
We hope our discussion inspires further research into the design of hybrid cryptographic protocols for quantum-classical communication networks.
arXiv Detail & Related papers (2024-11-01T23:36:19Z) - Experimental composable key distribution using discrete-modulated continuous variable quantum cryptography [1.9464379888286716]
We present the first experimental demonstration of a four-state DM CVQKD system, successfully generating composable finite-size keys.
This accomplishment is enabled by using an advanced security proof.
Results mark a significant step toward the large-scale deployment of practical, high-performance, cost-effective, and highly secure quantum key distribution networks.
arXiv Detail & Related papers (2024-10-17T16:05:08Z) - Distributed Quantum Computing in Silicon [40.16556091789959]
We present preliminary demonstrations of some key distributed quantum computing protocols on silicon T centres in isotopically-enriched silicon.
We demonstrate the distribution of entanglement between modules and consume it to apply a teleported gate sequence.
arXiv Detail & Related papers (2024-06-03T18:02:49Z) - Overcoming Noise Limitations in QKD with Quantum Privacy Amplification [0.0]
We show experimentally that QPA is able to increase the secure key rate achievable with QKD by improving the quality of distributed entanglement.
We show that QPA enables key generation at noise levels that previously prevented key generation.
Results are paramount for the implementation of a global quantum network linking quantum processors and ensuring future-proof data security.
arXiv Detail & Related papers (2024-02-08T14:07:36Z) - Practical quantum secure direct communication with squeezed states [55.41644538483948]
We report the first table-top experimental demonstration of a CV-QSDC system and assess its security.
This realization paves the way into future threat-less quantum metropolitan networks, compatible with coexisting advanced wavelength division multiplexing (WDM) systems.
arXiv Detail & Related papers (2023-06-25T19:23:42Z) - High-rate continuous-variable measurement device-independent quantum key distribution with finite-size security [0.0]
Continuous-variable (CV) measurement-device-independent (MDI) QKD is a promising candidate for creating various quantum network topologies.
Here, we report the first experimental validation of a CV MDI-QKD system, achieving a secure key rate of 2.6 Mbit/s against collective attacks.
arXiv Detail & Related papers (2023-03-02T22:20:29Z) - Conference key agreement in a quantum network [67.410870290301]
Quantum conference key agreement (QCKA) allows multiple users to establish a secure key from a shared multi-partite entangled state.
In a quantum network, this protocol can be efficiently implemented using a single copy of a N-qubit Greenberger-Horne-Zeilinger (GHZ) state to distil a secure N-user conference key bit.
arXiv Detail & Related papers (2022-07-04T18:00:07Z) - Towards fully-fledged quantum and classical communication over deployed
fiber with up-conversion module [47.187609203210705]
We propose and demonstrate a new method, based on up-conversion assisted receiver, for co-propagating classical light and QKD signals.
Our proposal exhibits higher tolerance for noise in comparison to the standard receiver, thus enabling the distribution of secret keys in the condition of 4 dB-higher classical power.
arXiv Detail & Related papers (2021-06-09T13:52:27Z) - Composably secure data processing for Gaussian-modulated continuous
variable quantum key distribution [58.720142291102135]
Continuous-variable quantum key distribution (QKD) employs the quadratures of a bosonic mode to establish a secret key between two remote parties.
We consider a protocol with homodyne detection in the general setting of composable finite-size security.
In particular, we analyze the high signal-to-noise regime which requires the use of high-rate (non-binary) low-density parity check codes.
arXiv Detail & Related papers (2021-03-30T18:02:55Z) - Implementation of Continuous-Variable Quantum Key Distribution with Composable and One-Sided-Device-Independent Security Against Coherent Attacks [0.0]
State-of-the-art quantum key distribution requires composable security against coherent attacks.
We present an implementation of continuous-variable quantum key distribution satisfying these requirements.
Our work is a crucial step towards practical implementations of quantum key distribution with state-of-the-art security based solely on telecom components.
arXiv Detail & Related papers (2014-06-24T09:20:24Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.