Security of deterministic key distribution with higher-dimensional systems
- URL: http://arxiv.org/abs/2505.17194v1
- Date: Thu, 22 May 2025 18:04:17 GMT
- Title: Security of deterministic key distribution with higher-dimensional systems
- Authors: Ayan Patra, Abhishek Muhuri, Rivu Gupta, Tamoghna Das, Aditi Sen De,
- Abstract summary: We determine the security aspects of the two-way quantum key distribution protocol designed by M. Lucamarini and S. Mancini in 2005.<n>We employ arbitrary finite-dimensional systems against both individual and collective attacks by the eavesdropper.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: We determine the security aspects of the two-way quantum key distribution protocol designed by M. Lucamarini and S. Mancini in 2005 (in short, the LM05 protocol) by employing arbitrary finite-dimensional systems against both individual and collective attacks by the eavesdropper. We explicitly delineate the constituent steps in higher dimensions using the Heisenberg-Weyl operators for the encoding and the measurement operations. For individual attacks, we consider cloning operations by the eavesdropper and demonstrate a dimensional advantage where secret keys can be generated for greater strengths of interception. To analyze security under collective attacks, we employ a purification scheme and derive the key rate using entropic uncertainty relations. Further, we exhibit how the protocol is more robust against eavesdropping with increasing dimension of the systems used, and compare the performance with that of the entangled two-way secure dense coding protocol when affected by correlated and uncorrelated noise, which models the presence of the eavesdropper.
Related papers
- Secure One-Sided Device-Independent Quantum Key Distribution Under Collective Attacks with Enhanced Robustness [0.0]
We study the security of a quantum key distribution protocol under the one-sided device-independent (1sDI) setting.<n>We show that the protocol tolerates higher quantum bit error rates (QBER) than present DI-QKD protocols.
arXiv Detail & Related papers (2025-07-24T18:47:04Z) - DP2Guard: A Lightweight and Byzantine-Robust Privacy-Preserving Federated Learning Scheme for Industrial IoT [37.44256772381154]
DP2Guard is a lightweight PPFL framework that enhances both privacy and robustness.<n>A hybrid defense strategy is proposed, which extracts gradient features using singular value decomposition and cosine similarity.<n>A trust score-based adaptive aggregation scheme adjusts client weights according to historical behavior.
arXiv Detail & Related papers (2025-07-22T01:06:39Z) - Improved finite-size effects in QKD protocols with applications to decoy-state QKD [0.0]
We present a finite-size security proof for generic quantum key distribution protocols against independent and identically distributed collective attacks.<n>We extend our proof to coherent attacks and variable-length protocols.
arXiv Detail & Related papers (2025-02-07T23:37:50Z) - Control landscapes for high-fidelity generation of C-NOT and C-PHASE gates with coherent and environmental driving [41.94295877935867]
We consider the problem of high fidelity generation of two-qubit C-NOT and C-PHASE (with a detailed study of C-Z) gates in presence of the environment.
We study quantum control landscapes which describe the behaviour of the fidelity as a function of the controls.
arXiv Detail & Related papers (2024-05-23T00:04:19Z) - Security Assumptions in Dispersive-Optics QKD [3.249879651054463]
Quantum key distribution (QKD) seeks to provide a method of generating cryptographically-secure keys between remote parties.
We provide examples where a significant gap exists between the Holevo information, and therefore the secret key rate, predicted by two models.
arXiv Detail & Related papers (2024-03-13T23:14:49Z) - TernaryVote: Differentially Private, Communication Efficient, and
Byzantine Resilient Distributed Optimization on Heterogeneous Data [50.797729676285876]
We propose TernaryVote, which combines a ternary compressor and the majority vote mechanism to realize differential privacy, gradient compression, and Byzantine resilience simultaneously.
We theoretically quantify the privacy guarantee through the lens of the emerging f-differential privacy (DP) and the Byzantine resilience of the proposed algorithm.
arXiv Detail & Related papers (2024-02-16T16:41:14Z) - Dimensional advantage in secure information trading via the noisy dense coding protocol [0.0]
We present the DC-based QKD protocol for higher dimensional systems.
We report the lower bounds on secret key rate, when the shared state is a two-qudit maximally entangled state.
We prove that the set of useless states in the DC-based QKD protocol is convex and compact.
arXiv Detail & Related papers (2023-10-31T17:50:48Z) - An Efficient and Multi-private Key Secure Aggregation for Federated Learning [41.29971745967693]
We propose an efficient and multi-private key secure aggregation scheme for federated learning.
Specifically, we skillfully modify the variant ElGamal encryption technique to achieve homomorphic addition operation.
For the high dimensional deep model parameter, we introduce a super-increasing sequence to compress multi-dimensional data into 1-D.
arXiv Detail & Related papers (2023-06-15T09:05:36Z) - Spatial-Frequency Discriminability for Revealing Adversarial Perturbations [53.279716307171604]
Vulnerability of deep neural networks to adversarial perturbations has been widely perceived in the computer vision community.
Current algorithms typically detect adversarial patterns through discriminative decomposition for natural and adversarial data.
We propose a discriminative detector relying on a spatial-frequency Krawtchouk decomposition.
arXiv Detail & Related papers (2023-05-18T10:18:59Z) - Experimental quantum secret sharing based on phase encoding of coherent
states [17.01107355316032]
We propose a quantum secret sharing protocol with simple phase encoding of coherent states among three parties.
Our scheme achieves a key rate of 85.3 bps under a 35 dB channel loss.
arXiv Detail & Related papers (2023-03-26T04:35:07Z) - Data post-processing for the one-way heterodyne protocol under
composable finite-size security [62.997667081978825]
We study the performance of a practical continuous-variable (CV) quantum key distribution protocol.
We focus on the Gaussian-modulated coherent-state protocol with heterodyne detection in a high signal-to-noise ratio regime.
This allows us to study the performance for practical implementations of the protocol and optimize the parameters connected to the steps above.
arXiv Detail & Related papers (2022-05-20T12:37:09Z) - Experimental measurement-device-independent type quantum key
distribution with flawed and correlated sources [14.143874849657317]
Security of quantum key distribution (QKD) is threatened by discrepancies between realistic devices and theoretical assumptions.
Here, we adopt the reference technique to prove security of an efficient four-phase measurement-device-independent QKD using laser pulses against potential source imperfections.
In addition, we demonstrate the feasibility of our protocol through a proof-of-principle experimental implementation and achieve a secure key rate of 253 bps with a 20 dB channel loss.
arXiv Detail & Related papers (2022-04-18T13:44:51Z) - Composably secure data processing for Gaussian-modulated continuous
variable quantum key distribution [58.720142291102135]
Continuous-variable quantum key distribution (QKD) employs the quadratures of a bosonic mode to establish a secret key between two remote parties.
We consider a protocol with homodyne detection in the general setting of composable finite-size security.
In particular, we analyze the high signal-to-noise regime which requires the use of high-rate (non-binary) low-density parity check codes.
arXiv Detail & Related papers (2021-03-30T18:02:55Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.