High-Dimensional Quantum Key Distribution with Qubit-like States
- URL: http://arxiv.org/abs/2504.03893v1
- Date: Fri, 04 Apr 2025 19:34:28 GMT
- Title: High-Dimensional Quantum Key Distribution with Qubit-like States
- Authors: Lukas Scarfe, Rojan Abolhassani, Frédéric Bouchard, Aaron Goldberg, Khabat Heshami, Francesco Di Colandrea, Ebrahim Karimi,
- Abstract summary: We introduce a high-dimensional QKD protocol using qubit-like states, referred to as Fourier-qubits (or $textitF$-qubits)<n>In our scheme, each $textitF$-qubit is a superposition of only two computational basis states with a relative phase that can take $d$ distinct values, where $d$ is the dimension of the computational basis.<n>This non-mutually unbiased approach allows us to bound the information leaked to an eavesdropper, maintaining security in high-dimensional quantum systems despite the states' seemingly two-dimensional nature
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Quantum key distribution (QKD) protocols most often use two conjugate bases in order to verify the security of the quantum channel. In the majority of protocols, these bases are mutually unbiased to one another, which is to say they are formed from balanced superpositions of the entire set of states in the opposing basis. Here, we introduce a high-dimensional QKD protocol using qubit-like states, referred to as Fourier-qubits (or $\textit{F}$-qubits). In our scheme, each $\textit{F}$-qubit is a superposition of only two computational basis states with a relative phase that can take $d$ distinct values, where $d$ is the dimension of the computational basis. This non-mutually unbiased approach allows us to bound the information leaked to an eavesdropper, maintaining security in high-dimensional quantum systems despite the states' seemingly two-dimensional nature. By simplifying state preparation and measurement, our protocol offers a practical alternative for secure high-dimensional quantum communications. We experimentally demonstrate this protocol for a noisy high-dimensional QKD channel using the orbital angular momentum degree of freedom of light and discuss the potential benefits for encoding in other degrees of freedom.
Related papers
- Quantum Hypothesis Testing Lemma for Deterministic Identification over Quantum Channels [49.126395046088014]
We show that the existence of a DI code in the quantum setting follows from a suitable packing in a modified space of output quantum states.
This result enables us to tighten the capacity lower bound for DI over quantum channels beyond the simultaneous decoding approach.
arXiv Detail & Related papers (2025-04-29T17:57:36Z) - Quantum Homogenization as a Quantum Steady State Protocol on NISQ Hardware [42.52549987351643]
Quantum homogenization is a reservoir-based quantum state approximation protocol.<n>We extend the standard quantum homogenization protocol to the dynamically-equivalent ($mathttSWAP$)$alpha$ formulation.<n>We show that our proposed protocol yields a completely positive, trace preserving (CPTP) map under which the code subspace is correctable.
arXiv Detail & Related papers (2024-12-19T05:50:54Z) - Twin-field-based multi-party quantum key agreement [0.0]
We study a method to extend the twin-field key distribution protocol to a scheme for multi-party quantum key agreement.<n>We study our protocol's security using a minimum error discrimination analysis and derive the key rate based on the entanglement-based source-replacement scheme.
arXiv Detail & Related papers (2024-09-06T11:51:10Z) - Efficient source-independent quantum conference key agreement [25.617190829449893]
Quantum conference key agreement (QCKA) enables the unconditional secure distribution of conference keys among multiple participants.
We propose a source-independent QCKA scheme utilizing the post-matching method.
We introduce an equivalent distributing virtual multi-photon entanglement protocol for providing the unconditional security proof.
arXiv Detail & Related papers (2024-06-25T04:24:06Z) - Single-Round Proofs of Quantumness from Knowledge Assumptions [41.94295877935867]
A proof of quantumness is an efficiently verifiable interactive test that an efficient quantum computer can pass.
Existing single-round protocols require large quantum circuits, whereas multi-round ones use smaller circuits but require experimentally challenging mid-circuit measurements.
We construct efficient single-round proofs of quantumness based on existing knowledge assumptions.
arXiv Detail & Related papers (2024-05-24T17:33:10Z) - Gaussian conversion protocol for heralded generation of qunaught states [66.81715281131143]
bosonic codes map qubit-type quantum information onto the larger bosonic Hilbert space.
We convert between two instances of these codes GKP qunaught states and four-foldsymmetric binomial states corresponding to a zero-logical encoded qubit.
We obtain GKP qunaught states with a fidelity of over 98% and a probability of approximately 3.14%.
arXiv Detail & Related papers (2023-01-24T14:17:07Z) - Conference key agreement in a quantum network [67.410870290301]
Quantum conference key agreement (QCKA) allows multiple users to establish a secure key from a shared multi-partite entangled state.
In a quantum network, this protocol can be efficiently implemented using a single copy of a N-qubit Greenberger-Horne-Zeilinger (GHZ) state to distil a secure N-user conference key bit.
arXiv Detail & Related papers (2022-07-04T18:00:07Z) - Efficient Bipartite Entanglement Detection Scheme with a Quantum
Adversarial Solver [89.80359585967642]
Proposal reformulates the bipartite entanglement detection as a two-player zero-sum game completed by parameterized quantum circuits.
We experimentally implement our protocol on a linear optical network and exhibit its effectiveness to accomplish the bipartite entanglement detection for 5-qubit quantum pure states and 2-qubit quantum mixed states.
arXiv Detail & Related papers (2022-03-15T09:46:45Z) - Security of a High Dimensional Two-Way Quantum Key Distribution Protocol [1.827510863075184]
Two-way quantum key distribution protocols utilize bi-directional quantum communication to establish a shared secret key.
We investigate a high-dimensional variant of the Ping Pong protocol and perform an information theoretic security analysis in the finite-key setting.
arXiv Detail & Related papers (2022-03-06T15:36:54Z) - Parallel self-testing of EPR pairs under computational assumptions [12.847847919343646]
We show that a single EPR pair of a single quantum device can be self-tested under computational assumptions.
We show that our protocol can be passed with probability negligibly close to $1$ by an honest quantum device.
A simplified version of our protocol is the first that can efficiently certify an arbitrary number of qubits of a single cloud quantum computer.
arXiv Detail & Related papers (2022-01-31T18:42:45Z) - Quantum key distribution based on orthogonal state encoding [0.0]
Two quantum key distribution protocols are presented.
One does not need to employ order-rearrangement techniques while the other needs to.
We modify the protocols for implementing in noisy channels by applying the testing state method.
arXiv Detail & Related papers (2021-07-05T12:14:05Z) - Phase-Matching Quantum Cryptographic Conferencing [10.15251318968606]
We report a QCC protocol based on weak coherent state interferences named phase-matching quantum cryptographic conferencing.
The proposed protocol can improve the key generation rate from $mathrmO(etaN)$ to $mathrmO(etaN-1)$ compared with the measurement device independent QCC protocols.
arXiv Detail & Related papers (2020-06-24T03:26:00Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.