Modeling and Characterization of Arbitrary Order Pulse Correlations for Quantum Key Distribution
- URL: http://arxiv.org/abs/2506.18684v2
- Date: Wed, 02 Jul 2025 08:48:25 GMT
- Title: Modeling and Characterization of Arbitrary Order Pulse Correlations for Quantum Key Distribution
- Authors: Ainhoa Agulleiro, Fadri Grünenfelder, Margarida Pereira, Guillermo Currás-Lorenzo, Hugo Zbinden, Marcos Curty, Davide Rusca,
- Abstract summary: We introduce a simple linear model to explain pulse correlations.<n>We experimentally characterize short-range correlations and apply the proposed method to account for long-range correlations to an infinite order.
- Score: 0.31410859223862103
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: In quantum key distribution (QKD) implementations, memory effects caused by the limited bandwidth of modulators and/or other active devices can leak information about previous setting choices. Security proofs addressing this imperfection require the characterization of pulse correlations, which, in principle, can be of an arbitrary order, even unbounded. Experimentally, this is very hard (if not impossible) to achieve. Here, we solve this pressing problem by introducing a simple linear model to explain pulse correlations. In so doing, we can derive upper bounds on the correlation strength of arbitrary order from the study of the step response of the system. Importantly, this is what is needed to ensure the security of QKD in the presence of pulse correlations of unbounded length. We experimentally characterize short-range correlations and apply the proposed method to account for long-range correlations to an infinite order.
Related papers
- Finite-correlation-secure quantum key distribution [6.781525278813814]
Correlation between different pulses is a nettlesome problem in quantum key distribution (QKD)<n>We propose a new protocol immune to all correlations of all dimensions, with the only requirements of non-entangled and finite-ranged correlation, and bounded vacuum probability.<n>We provide the finite-key security analysis against coherent attacks and conduct numerical simulations to see the performance.
arXiv Detail & Related papers (2025-07-15T12:17:08Z) - Revealing correlated noise with single-qubit operations [0.0]
Spatially correlated noise poses a significant challenge to fault-tolerant quantum computation.<n>We propose straightforward and efficient techniques to detect and quantify these correlations.<n>Specifically, we use that correlated relaxation is connected to the superradiance effect which we show to be accessible by single-qubit measurements.
arXiv Detail & Related papers (2025-02-13T19:00:10Z) - Quantum key distribution overcoming practical correlated intensity fluctuations [11.207894122345138]
Intensity correlations between neighboring pulses open a prevalent yet often overlooked security loophole in decoy-state quantum key distribution (QKD)<n>We present and experimentally demonstrate an intensity-correlation-tolerant QKD protocol that mitigates the negative effect that this phenomenon has on the secret key rate.
arXiv Detail & Related papers (2025-01-23T08:56:26Z) - Automatic Double Reinforcement Learning in Semiparametric Markov Decision Processes with Applications to Long-Term Causal Inference [33.14076284663493]
Markov Decision Processes (MDPs) offer a principled framework for modeling outcomes as sequences of states, actions, and rewards over time.<n>We introduce a semiparametric extension of Double Reinforcement Learning (DRL) for statistically efficient, model-robust inference on linear functionals of the Q-function.<n>We develop a novel debiased plug-in estimator based on isotonic Bellman calibration, which integrates fitted Q-it with an isotonic regression step.
arXiv Detail & Related papers (2025-01-12T20:35:28Z) - Characterising higher-order phase correlations in gain-switched laser sources with application to quantum key distribution [38.00713966087315]
Multi-photon emissions in laser sources represent a serious threat for the security of quantum key distribution.<n>We introduce experimental schemes to characterise the phase probability distribution of the emitted pulses.<n>We demonstrate that an optimisation task over interferometric measures suffices in determining the impact of arbitrary order correlations.
arXiv Detail & Related papers (2024-12-04T22:06:13Z) - Characterization of Intensity Correlation via Single-photon Detection in Quantum Key Distribution [10.02327858833847]
One of the most significant vulnerabilities in the source unit of quantum key distribution (QKD) is the correlation between quantum states after modulation.
We propose a methodology to characterize the intensity correlation according to the single-photon detection results in the measurement unit.
arXiv Detail & Related papers (2024-08-15T06:13:20Z) - Spectroscopy and complex-time correlations using minimally entangled typical thermal states [39.58317527488534]
We introduce a practical approach to computing such correlators using minimally entangled typical thermal states.<n>We show that these numerical techniques capture the finite-temperature dynamics of the Shastry-Sutherland model.
arXiv Detail & Related papers (2024-05-28T18:00:06Z) - Debiased Collaborative Filtering with Kernel-Based Causal Balancing [28.89858891537214]
We propose an algorithm that adaptively balances the kernel function and theoretically analyze the generalization error bound of our methods.
We conduct extensive experiments to demonstrate the effectiveness of our methods.
arXiv Detail & Related papers (2024-04-30T14:43:51Z) - Quantum key distribution with unbounded pulse correlations [0.0]
A prevalent issue in practical applications of quantum key distribution (QKD) is the emergence of correlations among the emitted signals.
We introduce a general formalism designed to extend existing security proofs to the practically relevant scenario.
This approach significantly enhances the applicability of these proofs and the robustness of QKD's implementation security.
arXiv Detail & Related papers (2024-02-12T19:43:46Z) - Causal Discovery via Conditional Independence Testing with Proxy Variables [35.3493980628004]
The presence of unobserved variables, such as the latent confounder, can introduce bias in conditional independence testing.
We propose a novel hypothesis-testing procedure that can effectively examine the existence of the causal relationship over continuous variables.
arXiv Detail & Related papers (2023-05-09T09:08:39Z) - The Role of Interactivity in Structured Estimation [44.068012503785475]
We study high-dimensional estimation under three natural constraints.
Without sparsity assumptions, interactivity cannot improve the minimax rates of estimation.
We establish that the gap increases when we have more structured sparsity.
arXiv Detail & Related papers (2022-03-14T05:54:42Z) - Decimation technique for open quantum systems: a case study with
driven-dissipative bosonic chains [62.997667081978825]
Unavoidable coupling of quantum systems to external degrees of freedom leads to dissipative (non-unitary) dynamics.
We introduce a method to deal with these systems based on the calculation of (dissipative) lattice Green's function.
We illustrate the power of this method with several examples of driven-dissipative bosonic chains of increasing complexity.
arXiv Detail & Related papers (2022-02-15T19:00:09Z) - Security of quantum key distribution with intensity correlations [0.0]
In high-speed decoy-state QKD systems, intensity correlations between succeeding pulses leak information about the users' intensity settings.
Here, we develop a technique to incorporate arbitrary intensity correlations to the security analysis of decoy-state QKD.
arXiv Detail & Related papers (2021-05-24T09:13:03Z) - Composably secure data processing for Gaussian-modulated continuous
variable quantum key distribution [58.720142291102135]
Continuous-variable quantum key distribution (QKD) employs the quadratures of a bosonic mode to establish a secret key between two remote parties.
We consider a protocol with homodyne detection in the general setting of composable finite-size security.
In particular, we analyze the high signal-to-noise regime which requires the use of high-rate (non-binary) low-density parity check codes.
arXiv Detail & Related papers (2021-03-30T18:02:55Z) - Disentangling Observed Causal Effects from Latent Confounders using
Method of Moments [67.27068846108047]
We provide guarantees on identifiability and learnability under mild assumptions.
We develop efficient algorithms based on coupled tensor decomposition with linear constraints to obtain scalable and guaranteed solutions.
arXiv Detail & Related papers (2021-01-17T07:48:45Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.