Device Independent Quantum Key Distribution with realistic single-photon source implementations DOI Creative Commons
Eva M. González-Ruiz, Javier Rivera-Dean, Marina F. B. Cenni

et al.

arXiv (Cornell University), Journal Year: 2022, Volume and Issue: unknown

Published: Jan. 1, 2022

Device Independent Quantum Key Distribution (DIKQD) aims at generating secret keys between distant parties without the trusting their devices. We investigate a proposal for performing fully photonic DIQKD, based on single-photon sources and heralding measurements central station placed two parties. derive conditions to attain non-zero secret-key rates in terms of photon efficiency, indistinguishability second order autocorrelation function sources. Exploiting new results security bound such protocols allows us reduce requirements physical parameters setup. Our analysis shows that considered schemes, key several hundreds bits per are within reach distances tens kilometers.

Language: Английский

Security of differential phase shift QKD from relativistic principles DOI Creative Commons

Martin Sandfuchs,

Michael Haberland,

V. Vilasini

et al.

Quantum, Journal Year: 2025, Volume and Issue: 9, P. 1611 - 1611

Published: Jan. 27, 2025

The design of quantum protocols for secure key generation poses many challenges: On the one hand, they need to be practical concerning experimental realisations. other their theoretical description must simple enough allow a security proof against all possible attacks. Often, these two requirements are in conflict with each other, and differential phase shift (DPS) QKD protocol exemplifies difficulties: It is designed implementable current optical telecommunication technology, which, this protocol, comes at cost that standard techniques do not apply it. After about 20 years since its invention, work presents first full DPS general attacks, including finite-size effects. combines from information theory, optics, relativity. We give whose stems relativistic constraints. then show can reduced protocol. In addition, we coherent attacks on are, fact, stronger than collective Our results have broad implications development reliable communication technologies, as shed light range applicability state-of-the-art techniques.

Language: Английский

Citations

2

Security of quantum key distribution from generalised entropy accumulation DOI Creative Commons
Tony Metger, Renato Renner

Nature Communications, Journal Year: 2023, Volume and Issue: 14(1)

Published: Aug. 29, 2023

Language: Английский

Citations

24

Semidefinite programming relaxations for quantum correlations DOI
Armin Tavakoli, Alejandro Pozas-Kerstjens, Peter Brown

et al.

Reviews of Modern Physics, Journal Year: 2024, Volume and Issue: 96(4)

Published: Dec. 4, 2024

Semidefinite programs are convex optimisation problems involving a linear objective function and domain of positive-semidefinite matrices.Over the past two decades, they have become an indispensable tool in quantum information science.Many otherwise intractable fundamental applied can be successfully approached by means relaxation to semidefinite program.Here, we review such methodology context correlations.We discuss how core idea relaxations adapted for variety research topics correlations, including nonlocality, communication, networks, entanglement, cryptography. CONTENTSI. Introduction 2 II.Background 3 A. Primals duals B. Correlation scenarios theory 1.Entanglement-based 4 2. Communication-based 7 C. Overview hierarchies 9 III.Semidefinite polynomial Commutative 1.Moment matrix approach Sum squares 11 Noncommutative 12 13 IV.Entanglement 14 Doherty-Parrilo-Spedalieri hierarchy Bipartite entanglement 15 1.Quantifying Detecting dimension 17 Multipartite 18 1.Entanglement detection 2.Quantum marginal 19 V.Quantum nonlocality 20 The Navascués-Pironio-Acín 1. Macroscopic Locality & Almost-Quantum Correlations 21 Tsirelson bounds 22 Device-independent certification 23 1.Self-testing Entanglement 24 3. 25 4. Joint measurability 26 VI.Quantum communication 27 Channel capacities 1.Classical 28 Quantum 30 Dimension constraints Bounding set 31 Applications 32 Entanglement-assisted Teleportation Distinguishability 1.Distinguishability Discrimination tasks VII.Randomness key distribution min-entropy von Neumann entropy Beyond optimisations Device-dependent Semi-device-independent VIII.Correlations networks Inflation methods Classical inflation No-signaling independence Other SDP network correlations Relaxations factorisation Tests topology IX.Further models Generalised Bell ground-state energies D. Rank-constrained E. contextuality F. Symmetrisation X. Conclusions Table abbreviations Implementation guide Strict feasibility optimal value Eq. (12) is nonnegative.As before, it also interesting consider dual LP, min {c abxy } a,b,x,y c p(a, b|x, y) s.t.λ,a,b,x,y D(a|x, λ)D(b|y, λ) = 1, ≥ 0 ∀ λ.

Language: Английский

Citations

11

High-dimensional coherent one-way quantum key distribution DOI Creative Commons
Kfir Sulimany, Guy Pelc,

Rom Dudkiewicz

et al.

npj Quantum Information, Journal Year: 2025, Volume and Issue: 11(1)

Published: Jan. 29, 2025

Language: Английский

Citations

1

Resource-Efficient High-Dimensional Entanglement Detection via Symmetric Projections DOI
Simon Morelli, Marcus Huber, Armin Tavakoli

et al.

Physical Review Letters, Journal Year: 2023, Volume and Issue: 131(17)

Published: Oct. 25, 2023

We introduce two families of criteria for detecting and quantifying the entanglement a bipartite quantum state arbitrary local dimension. The first is based on measurements in mutually unbiased bases second equiangular measurements. Both give qualitative result terms state's dimension quantitative its fidelity with maximally entangled state. are universally applicable since no assumptions required. Moreover, experimenter can control trade-off between resource-efficiency noise-tolerance by selecting number performed. For paradigmatic noise models, we show that only small necessary to achieve nearly-optimal detection any global product projections scales linearly dimension, thus paving way quantification very high-dimensional entanglement.

Language: Английский

Citations

14

Quantum key distribution rates from non-symmetric conic optimization DOI Creative Commons

Andrés González Lorente,

Pablo V. Parellada, Miguel Castillo-Celeita

et al.

Quantum, Journal Year: 2025, Volume and Issue: 9, P. 1657 - 1657

Published: March 10, 2025

Computing key rates in quantum distribution (QKD) numerically is essential to unlock more powerful protocols, that use sophisticated measurement bases or systems of higher dimension. It a difficult optimization problem, depends on minimizing convex non-linear function: the (quantum) relative entropy. Standard conic techniques have for long time been unable handle entropy cone, as it non-symmetric and standard algorithms can only symmetric ones. Recently, however, practical algorithm has discovered optimizing over cones, including Here we adapt this problem computation rates, obtaining an efficient technique lower bounding them. In comparison previous advantages flexibility, ease use, above all performance.

Language: Английский

Citations

0

Comparison of confidence regions for quantum state tomography DOI Creative Commons
J. Almeida, Matthias Kleinmann, Gael Sentís

et al.

New Journal of Physics, Journal Year: 2023, Volume and Issue: 25(11), P. 113018 - 113018

Published: Oct. 25, 2023

Abstract The quantum state associated to an unknown experimental preparation procedure can be determined by performing tomography. If the statistical uncertainty in data dominates over other errors, then a tomographic reconstruction must express this uncertainty. A rigorous way accomplish is via confidence regions (CRs) space. Naturally, size of region decreases when increasing number samples, but it also depends critically on construction method region. We compare recent methods for constructing CRs as well reference based Gaussian approximation. For comparison, we propose operational measure with finding, that there significant difference between methods, which preferable depend details scenario.

Language: Английский

Citations

5

Harnessing high-dimensional temporal entanglement using limited interferometric setups DOI
Florian Kanitschar,

Alexandra Bergmayr-Mann,

Matej Pivoluska

et al.

Physical Review Applied, Journal Year: 2024, Volume and Issue: 22(5)

Published: Nov. 20, 2024

High-dimensional entanglement has been shown to provide significant advantages in quantum communication. One of its most promising implementations is available the time domain routinely produced spontaneous parametric down-conversion . While advantageous sense that only a single detector channel needed locally, it notoriously hard analyze, especially an assumption-free manner as required for key distribution (QKD) applications. We develop complete analysis high-dimensional polarization-time and show how efficiently certify relevant density matrix elements security parameters QKD. In addition putting past experiments on rigorous footing, we also physical noise model propose setup can further enhance resistance free-space

Language: Английский

Citations

1

Security of differential phase shift QKD from relativistic principles DOI Creative Commons

Martin Sandfuchs,

Michael Haberland,

V. Vilasini

et al.

arXiv (Cornell University), Journal Year: 2023, Volume and Issue: unknown

Published: Jan. 1, 2023

The design of quantum protocols for secure key generation poses many challenges: On the one hand, they need to be practical concerning experimental realisations. other their theoretical description must simple enough allow a security proof against all possible attacks. Often, these two requirements are in conflict with each other, and differential phase shift (DPS) QKD protocol exemplifies difficulties: It is designed implementable current optical telecommunication technology, which, this protocol, comes at cost that standard techniques do not apply it. After about 20 years since its invention, work presents first full DPS general attacks, including finite-size effects. combines from information theory, optics, relativity. We give whose stems relativistic constraints. then show can reduced protocol. In addition, we coherent attacks on are, fact, stronger than collective Our results have broad implications development reliable communication technologies, as shed light range applicability state-of-the-art techniques.

Language: Английский

Citations

1

Demonstration of Hierarchical SDN Orchestration for End-to-End Key Provisioning in Large-Scale Quantum Key Distribution Networks DOI
Yazi Wang, Xiaosong Yu, Zihao Wang

et al.

Published: July 31, 2023

We experimentally demonstrate end-to-end key provisioning among multiple QKDNs with a hierarchical SDN orchestration architecture, where the computational complexity is reduced via abstracted network views and seconds-level latency without manual intervention achieved.

Language: Английский

Citations

1