ترغب بنشر مسار تعليمي؟ اضغط هنا

Role of Bell-CHSH violation and local filtering in quantum key distribution

99   0   0.0 ( 0 )
 نشر من قبل Jaskaran Singh Mr.
 تاريخ النشر 2020
  مجال البحث فيزياء
والبحث باللغة English




اسأل ChatGPT حول البحث

In this article, we analyse the relationship between the Bell violation and the secure key rate of entanglement assisted quantum key distribution (QKD) protocols. Specifically, we address the question whether Bell violation is necessary or sufficient for secure communication. We construct a class of states which do not show Bell violation, however, which can be used for secure communication after local filtering. Similarly, we identify another class of states which show Bell violation but can not be used for generating secure key even after local filtering. The existence of these two classes of states demonstrates that Bell violation as an initial resource is neither necessary nor sufficient for QKD. Our work therefore forces a departure from traditional thinking that the degree of Bell violation is a key resource for quantum communication and brings out the role of local filtering.

قيم البحث

اقرأ أيضاً

159 - Erik Woodhead , Antonio Acin , 2020
The simplest device-independent quantum key distribution protocol is based on the Clauser-Horne-Shimony-Holt (CHSH) Bell inequality and allows two users, Alice and Bob, to generate a secret key if they observe sufficiently strong correlations. There is, however, a mismatch between the protocol, in which only one of Alices measurements is used to generate the key, and the CHSH expression, which is symmetric with respect to Alices two measurements. We therefore investigate the impact of using an extended family of Bell expressions where we give different weights to Alices measurements. Using this family of asymmetric Bell expressions improves the robustness of the key distribution protocol for certain experimentally-relevant correlations. As an example, the tolerable error rate improves from 7.15% to about 7.42% for the depolarising channel. Adding random noise to Alices key before the postprocessing pushes the threshold further to more than 8.34%. The main technical result of our work is a tight bound on the von Neumann entropy of one of Alices measurement outcomes conditioned on a quantum eavesdropper for the family of asymmetric CHSH expressions we consider and allowing for an arbitrary amount of noise preprocessing.
We report on a complete free-space field implementation of a modified Ekert91 protocol for quantum key distribution using entangled photon pairs. For each photon pair we perform a random choice between key generation and a Bell inequality. The amount of violation is used to determine the possible knowledge of an eavesdropper to ensure security of the distributed final key.
Since the experimental observation of the violation of the Bell-CHSH inequalities, much has been said about the non-local and contextual character of the underlying system. But the hypothesis from which Bells inequalities are derived differ according to the probability space used to write them. The violation of Bells inequalities can, alternatively, be explained assuming that the hidden variables do not exist at all, or that they exist but their values cannot be simultaneously assigned, or that the values can be assigned but joint probabilities cannot be properly defined, or that averages taken in different contexts cannot be combined. All of the above are valid options, selected by different communities to provide support to their particular research program.
We construct a simple algorithm to generate any CHSH type Bell inequality involving a party with two local binary measurements from two CHSH type inequalities without this party. The algorithm readily generalizes to situations, where the additional o bserver uses three measurement settings. There, each inequality involving the additional party is constructed from three inequalities with this party excluded. With this generalization at hand, we construct and analyze new symmetric inequalities for four observers and three experimental settings per observer.
This chapter describes the application of lasers, specifically diode lasers, in the area of quantum key distribution (QKD). First, we motivate the distribution of cryptographic keys based on quantum physical properties of light, give a brief introduc tion to QKD assuming the reader has no or very little knowledge about cryptography, and briefly present the state-of-the-art of QKD. In the second half of the chapter we describe, as an example of a real-world QKD system, the system deployed between the University of Calgary and SAIT Polytechnic. We conclude the chapter with a brief discussion of quantum networks and future steps.
التعليقات
جاري جلب التعليقات جاري جلب التعليقات
سجل دخول لتتمكن من متابعة معايير البحث التي قمت باختيارها
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا