ترغب بنشر مسار تعليمي؟ اضغط هنا

Ping-pong quantum key distribution with trusted noise: non-Markovian advantage

59   0   0.0 ( 0 )
 نشر من قبل Shrikant Utagi
 تاريخ النشر 2020
  مجال البحث فيزياء
والبحث باللغة English




اسأل ChatGPT حول البحث

The ping-pong protocol adapted for quantum key distribution is studied in the trusted quantum noise scenario, wherein the legitimate parties can add noise locally. For a well-studied attack model, we show how non-unital quantum non-Markovianity of the added noise can improve the key rate. We also point out that this noise-induced advantage cannot be obtained by Alice and Bob by adding local classical noise to their post-measurement data.


قيم البحث

اقرأ أيضاً

A Quantum Key Distribution (QKD) network is an infrastructure capable of performing long-distance and high-rate secret key agreement with information-theoretic security. In this paper we study security properties of QKD networks based on trusted repe ater nodes. Such networks can already be deployed, based on current technology. We present an example of a trusted repeater QKD network, developed within the SECOQC project. The main focus is put on the study of secure key agreement over a trusted repeater QKD network, when some nodes are corrupted. We propose an original method, able to ensure the authenticity and privacy of the generated secret keys.
We derive a sufficient condition for advantage distillation to be secure against collective attacks in device-independent quantum key distribution (DIQKD), focusing on the repetition-code protocol. In addition, we describe a semidefinite programming method to check whether this condition holds for any probability distribution obtained in a DIQKD protocol. Applying our method to various probability distributions, we find that advantage distillation is possible up to depolarising-noise values of $q approx 9.1%$ or limited detector efficiencies of $eta approx 89.1%$ in a 2-input 2-output scenario. This exceeds the noise thresholds of $q approx 7.1%$ and $eta approx 90.7%$ respectively for DIQKD with one-way error correction using the CHSH inequality, thereby showing that it is possible to distill secret key beyond those thresholds.
173 - Cosmo Lupo , Yingkai Ouyang 2021
Continuous-variable quantum key distribution exploits coherent measurements of the electromagnetic field, i.e., homodyne or heterodyne detection. The most advanced security analyses developed so far relied on idealised mathematical models for such me asurements, which assume that the measurement outcomes are continuous and unbounded variables. As any physical measurement device has finite range and precision, these mathematical models only serve as an approximation. It is expected that, under suitable conditions, the predictions obtained using these simplified models are in good agreement with the actual experimental implementations. However, a quantitative analysis of the error introduced by this approximation, and of its impact on composable security, have been lacking so far. Here we present a theory to rigorously account for the experimental limitations of realistic heterodyne detection. We focus on asymptotic security against collective attacks, and indicate a route to include finite-size effects.
278 - Aditi Kar , Michah Sageev 2015
Let $G$ be a group acting properly and essentially on an irreducible, non-Euclidean finite dimensional CAT(0) cube complex $X$ without fixed points at infinity. We show that for any finite collection of simultaneously inessential subgroups ${H_1, ldo ts, H_k}$ in $G$, there exists an element $g$ of infinite order such that $forall i$, $langle H_i, grangle cong H_i * langle grangle$. We apply this to show that any group, acting faithfully and geometrically on a non-Euclidean possibly reducible CAT(0) cube complex, has property $P_{naive}$ i.e. given any finite list ${g_1, ldots, g_k}$ of elements from $G$, there exists $g$ of infinite order such that $forall i$, $langle g_i, grangle cong langle g_i rangle *langle grangle$. This applies in particular to the Burger-Moses simple groups that arise as lattices in products of trees. The arguments utilize the action of the group on its Poisson boundary and moreover, allow us to summarise equivalent conditions for the reduced $C^*$-algebra of the group to be simple.
Quantum key distribution is one of the most fundamental cryptographic protocols. Quantum walks are important primitives for computing. In this paper we take advantage of the properties of quantum walks to design new secure quantum key distribution sc hemes. In particular, we introduce a secure quantum key-distribution protocol equipped with verification procedures against full man-in-the-middle attacks. Furthermore, we present a one-way protocol and prove its security. Finally, we propose a semi-quantum variation and prove its robustness against eavesdropping.
التعليقات
جاري جلب التعليقات جاري جلب التعليقات
سجل دخول لتتمكن من متابعة معايير البحث التي قمت باختيارها
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا