Generalized State Discrimination for Tunable Quantum Key Distribution: The phiQKD Protocol
- URL: http://arxiv.org/abs/2511.06488v1
- Date: Sun, 09 Nov 2025 18:19:33 GMT
- Title: Generalized State Discrimination for Tunable Quantum Key Distribution: The phiQKD Protocol
- Authors: Animesh Banik, Md. Shihab Khan, Rafid Masrur Khan, Syed Emad Uddin Shubha, Quazi Muhammad Rashed Nizam,
- Abstract summary: We introduce a tunable framework for generalized quantum state discrimination (GSD) and apply it to quantum key distribution (QKD) through a protocol we call phiQKD.<n>We show that, treating quantum measurement as a tunable parameter, rather than a fixed operation, enables flexible protocol optimization and improved performance under realistic constraints.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: We introduce a tunable framework for generalized quantum state discrimination (GSD) and apply it to quantum key distribution (QKD) through a protocol we call phiQKD. Building upon the two-state B92 protocol, phiQKD replaces the traditional unambiguous state discrimination (IDP) measurement with a one-parameter family of hybrid POVMs characterized by a tilting angle $\phi$. This allows for continuous control over the trade-off among correct, incorrect, and inconclusive outcomes. While the asymptotic key rate improvement over B92 is modest, phiQKD offers a practical advantage by enabling adaptability to noise and channel imperfections via measurement tunability. By evaluating the protocol under asymptotic, finite-key, and composable security models, we show that, treating quantum measurement as a tunable design parameter, rather than a fixed operation, enables flexible protocol optimization and improved performance under realistic constraints.
Related papers
- Asymmetric protocols for mode pairing quantum key distribution with finite-key analysis [5.323964523588455]
We conduct a security analysis of asymmetric MP-QKD protocol with the finite-key analysis.<n>Our work can achieve significantly enhanced secure key rates and transmission distances compared to the original strategy.
arXiv Detail & Related papers (2024-12-17T06:50:15Z) - Asymmetric mode-pairing quantum key distribution [4.122493139863035]
Mode-pairing quantum key distribution (MP-QKD) can surpass the repeaterless rate-transmittance bound without requiring global phase locking.
MP-QKD necessitates equal communication distances in two channels, which is a challenging requirement in practical applications.
We introduce an optimal-pulse-intensity method, adaptable to various scenarios, to enhance key rates by calculating ideal pulse intensities.
arXiv Detail & Related papers (2024-01-03T13:06:29Z) - Optimizing state-discrimination receivers for continuous-variable
quantum key distribution over a wiretap channel [1.3108652488669736]
We address a continuous-variable quantum key distribution protocol employing quaternary phase-shift-keying (QPSK) of coherent states.
We consider a pure-loss quantum wiretap channel, in which a possible eavesdropper is limited to collect the sole channel losses.
arXiv Detail & Related papers (2023-06-20T12:26:06Z) - Robust and efficient verification of graph states in blind
measurement-based quantum computation [52.70359447203418]
Blind quantum computation (BQC) is a secure quantum computation method that protects the privacy of clients.
It is crucial to verify whether the resource graph states are accurately prepared in the adversarial scenario.
Here, we propose a robust and efficient protocol for verifying arbitrary graph states with any prime local dimension.
arXiv Detail & Related papers (2023-05-18T06:24:45Z) - Reliable Quantum Communications based on Asymmetry in Distillation and Coding [35.693513369212646]
We address the problem of reliable provision of entangled qubits in quantum computing schemes.
We combine indirect transmission based on teleportation and distillation; (2) direct transmission, based on quantum error correction (QEC)
Our results show that ad-hoc asymmetric codes give, compared to conventional QEC, a performance boost and codeword size reduction both in a single link and in a quantum network scenario.
arXiv Detail & Related papers (2023-05-01T17:13:23Z) - Data post-processing for the one-way heterodyne protocol under
composable finite-size security [62.997667081978825]
We study the performance of a practical continuous-variable (CV) quantum key distribution protocol.
We focus on the Gaussian-modulated coherent-state protocol with heterodyne detection in a high signal-to-noise ratio regime.
This allows us to study the performance for practical implementations of the protocol and optimize the parameters connected to the steps above.
arXiv Detail & Related papers (2022-05-20T12:37:09Z) - Performance analysis of continuous-variable quantum key distribution
using non-Gaussian states [0.0]
In this study, we analyze the efficiency of a protocol with discrete modulation of continuous variable non-Gaussian states.
We calculate the secure key generation rate against collective attacks using the fact that Eve's information can be bounded based on the protocol.
arXiv Detail & Related papers (2021-12-19T11:55:17Z) - Deterministic Entanglement Transmission on Series-Parallel Quantum
Networks [2.86989372262348]
This paper explores and amplifies a new and more effective mapping of QN, referred to as concurrence percolation theory (ConPT)
We implement ConPT via a novel deterministic entanglement transmission scheme that is fully analogous to resistor network analysis.
The DET is designed for general d-dimensional information carriers, scalable and adaptable for any series-parallel QN, and experimentally feasible as tested on IBM's quantum platform.
arXiv Detail & Related papers (2021-10-11T03:29:03Z) - Fault-tolerant parity readout on a shuttling-based trapped-ion quantum
computer [64.47265213752996]
We experimentally demonstrate a fault-tolerant weight-4 parity check measurement scheme.
We achieve a flag-conditioned parity measurement single-shot fidelity of 93.2(2)%.
The scheme is an essential building block in a broad class of stabilizer quantum error correction protocols.
arXiv Detail & Related papers (2021-07-13T20:08:04Z) - Composably secure data processing for Gaussian-modulated continuous
variable quantum key distribution [58.720142291102135]
Continuous-variable quantum key distribution (QKD) employs the quadratures of a bosonic mode to establish a secret key between two remote parties.
We consider a protocol with homodyne detection in the general setting of composable finite-size security.
In particular, we analyze the high signal-to-noise regime which requires the use of high-rate (non-binary) low-density parity check codes.
arXiv Detail & Related papers (2021-03-30T18:02:55Z) - Round-robin differential phase-time-shifting protocol for quantum key
distribution: theory and experiment [58.03659958248968]
Quantum key distribution (QKD) allows the establishment of common cryptographic keys among distant parties.
Recently, a QKD protocol that circumvents the need for monitoring signal disturbance, has been proposed and demonstrated in initial experiments.
We derive the security proofs of the round-robin differential phase-time-shifting protocol in the collective attack scenario.
Our results show that the RRDPTS protocol can achieve higher secret key rate in comparison with the RRDPS, in the condition of high quantum bit error rate.
arXiv Detail & Related papers (2021-03-15T15:20:09Z) - Using Quantum Metrological Bounds in Quantum Error Correction: A Simple
Proof of the Approximate Eastin-Knill Theorem [77.34726150561087]
We present a proof of the approximate Eastin-Knill theorem, which connects the quality of a quantum error-correcting code with its ability to achieve a universal set of logical gates.
Our derivation employs powerful bounds on the quantum Fisher information in generic quantum metrological protocols.
arXiv Detail & Related papers (2020-04-24T17:58:10Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.