arXiv (Cornell University),
Journal Year:
2022,
Volume and Issue:
unknown
Published: Jan. 1, 2022
Device
Independent
Quantum
Key
Distribution
(DIKQD)
aims
at
generating
secret
keys
between
distant
parties
without
the
trusting
their
devices.
We
investigate
a
proposal
for
performing
fully
photonic
DIQKD,
based
on
single-photon
sources
and
heralding
measurements
central
station
placed
two
parties.
derive
conditions
to
attain
non-zero
secret-key
rates
in
terms
of
photon
efficiency,
indistinguishability
second
order
autocorrelation
function
sources.
Exploiting
new
results
security
bound
such
protocols
allows
us
reduce
requirements
physical
parameters
setup.
Our
analysis
shows
that
considered
schemes,
key
several
hundreds
bits
per
are
within
reach
distances
tens
kilometers.
Quantum,
Journal Year:
2025,
Volume and Issue:
9, P. 1611 - 1611
Published: Jan. 27, 2025
The
design
of
quantum
protocols
for
secure
key
generation
poses
many
challenges:
On
the
one
hand,
they
need
to
be
practical
concerning
experimental
realisations.
other
their
theoretical
description
must
simple
enough
allow
a
security
proof
against
all
possible
attacks.
Often,
these
two
requirements
are
in
conflict
with
each
other,
and
differential
phase
shift
(DPS)
QKD
protocol
exemplifies
difficulties:
It
is
designed
implementable
current
optical
telecommunication
technology,
which,
this
protocol,
comes
at
cost
that
standard
techniques
do
not
apply
it.
After
about
20
years
since
its
invention,
work
presents
first
full
DPS
general
attacks,
including
finite-size
effects.
combines
from
information
theory,
optics,
relativity.
We
give
whose
stems
relativistic
constraints.
then
show
can
reduced
protocol.
In
addition,
we
coherent
attacks
on
are,
fact,
stronger
than
collective
Our
results
have
broad
implications
development
reliable
communication
technologies,
as
shed
light
range
applicability
state-of-the-art
techniques.
Physical Review Letters,
Journal Year:
2023,
Volume and Issue:
131(17)
Published: Oct. 25, 2023
We
introduce
two
families
of
criteria
for
detecting
and
quantifying
the
entanglement
a
bipartite
quantum
state
arbitrary
local
dimension.
The
first
is
based
on
measurements
in
mutually
unbiased
bases
second
equiangular
measurements.
Both
give
qualitative
result
terms
state's
dimension
quantitative
its
fidelity
with
maximally
entangled
state.
are
universally
applicable
since
no
assumptions
required.
Moreover,
experimenter
can
control
trade-off
between
resource-efficiency
noise-tolerance
by
selecting
number
performed.
For
paradigmatic
noise
models,
we
show
that
only
small
necessary
to
achieve
nearly-optimal
detection
any
global
product
projections
scales
linearly
dimension,
thus
paving
way
quantification
very
high-dimensional
entanglement.
Quantum,
Journal Year:
2025,
Volume and Issue:
9, P. 1657 - 1657
Published: March 10, 2025
Computing
key
rates
in
quantum
distribution
(QKD)
numerically
is
essential
to
unlock
more
powerful
protocols,
that
use
sophisticated
measurement
bases
or
systems
of
higher
dimension.
It
a
difficult
optimization
problem,
depends
on
minimizing
convex
non-linear
function:
the
(quantum)
relative
entropy.
Standard
conic
techniques
have
for
long
time
been
unable
handle
entropy
cone,
as
it
non-symmetric
and
standard
algorithms
can
only
symmetric
ones.
Recently,
however,
practical
algorithm
has
discovered
optimizing
over
cones,
including
Here
we
adapt
this
problem
computation
rates,
obtaining
an
efficient
technique
lower
bounding
them.
In
comparison
previous
advantages
flexibility,
ease
use,
above
all
performance.
New Journal of Physics,
Journal Year:
2023,
Volume and Issue:
25(11), P. 113018 - 113018
Published: Oct. 25, 2023
Abstract
The
quantum
state
associated
to
an
unknown
experimental
preparation
procedure
can
be
determined
by
performing
tomography.
If
the
statistical
uncertainty
in
data
dominates
over
other
errors,
then
a
tomographic
reconstruction
must
express
this
uncertainty.
A
rigorous
way
accomplish
is
via
confidence
regions
(CRs)
space.
Naturally,
size
of
region
decreases
when
increasing
number
samples,
but
it
also
depends
critically
on
construction
method
region.
We
compare
recent
methods
for
constructing
CRs
as
well
reference
based
Gaussian
approximation.
For
comparison,
we
propose
operational
measure
with
finding,
that
there
significant
difference
between
methods,
which
preferable
depend
details
scenario.
Physical Review Applied,
Journal Year:
2024,
Volume and Issue:
22(5)
Published: Nov. 20, 2024
High-dimensional
entanglement
has
been
shown
to
provide
significant
advantages
in
quantum
communication.
One
of
its
most
promising
implementations
is
available
the
time
domain
routinely
produced
spontaneous
parametric
down-conversion
.
While
advantageous
sense
that
only
a
single
detector
channel
needed
locally,
it
notoriously
hard
analyze,
especially
an
assumption-free
manner
as
required
for
key
distribution
(QKD)
applications.
We
develop
complete
analysis
high-dimensional
polarization-time
and
show
how
efficiently
certify
relevant
density
matrix
elements
security
parameters
QKD.
In
addition
putting
past
experiments
on
rigorous
footing,
we
also
physical
noise
model
propose
setup
can
further
enhance
resistance
free-space
arXiv (Cornell University),
Journal Year:
2023,
Volume and Issue:
unknown
Published: Jan. 1, 2023
The
design
of
quantum
protocols
for
secure
key
generation
poses
many
challenges:
On
the
one
hand,
they
need
to
be
practical
concerning
experimental
realisations.
other
their
theoretical
description
must
simple
enough
allow
a
security
proof
against
all
possible
attacks.
Often,
these
two
requirements
are
in
conflict
with
each
other,
and
differential
phase
shift
(DPS)
QKD
protocol
exemplifies
difficulties:
It
is
designed
implementable
current
optical
telecommunication
technology,
which,
this
protocol,
comes
at
cost
that
standard
techniques
do
not
apply
it.
After
about
20
years
since
its
invention,
work
presents
first
full
DPS
general
attacks,
including
finite-size
effects.
combines
from
information
theory,
optics,
relativity.
We
give
whose
stems
relativistic
constraints.
then
show
can
reduced
protocol.
In
addition,
we
coherent
attacks
on
are,
fact,
stronger
than
collective
Our
results
have
broad
implications
development
reliable
communication
technologies,
as
shed
light
range
applicability
state-of-the-art
techniques.
We
experimentally
demonstrate
end-to-end
key
provisioning
among
multiple
QKDNs
with
a
hierarchical
SDN
orchestration
architecture,
where
the
computational
complexity
is
reduced
via
abstracted
network
views
and
seconds-level
latency
without
manual
intervention
achieved.