Key Rate

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 480069 Experts worldwide ranked by ideXlab platform

Walter O. Krawec - One of the best experts on this subject based on the ideXlab platform.

Norbert Lutkenhaus - One of the best experts on this subject based on the ideXlab platform.

  • Numerical Calculations of Finite Key Rate for General Quantum Key Distribution Protocols
    arXiv: Quantum Physics, 2020
    Co-Authors: Ian George, Jie Lin, Norbert Lutkenhaus
    Abstract:

    Finite Key analysis of quantum Key distribution (QKD) is an important tool for any QKD implementation. While much work has been done on the framework of finite Key analysis, the application to individual protocols often relies on the the specific protocol being simple or highly symmetric as well as represented in small finite-dimensional Hilbert spaces. In this work, we extend our pre-existing reliable, efficient, tight, and generic numerical method for calculating the asymptotic Key Rate of device-dependent QKD protocols in finite-dimensional Hilbert spaces to the finite Key regime using the security analysis framework of Renner. We explain how this extension preserves the reliability, efficiency, and tightness of the asymptotic method. We then explore examples which illustRate both the generality of our method as well as the importance of parameter estimation and data processing within the framework.

  • Upper bounds for the secure Key Rate of the decoy-state quantum Key distribution
    Physical Review A, 2009
    Co-Authors: Marcos Curty, Tobias Moroder, Norbert Lutkenhaus
    Abstract:

    The use of decoy states in quantum Key distribution (QKD) has provided a method for substantially increasing the secret Key Rate and distance that can be covered by QKD protocols with practical signals. The security analysis of these schemes, however, leaves open the possibility that the development of better proof techniques, or better classical post-processing methods, might further improve their performance in realistic scenarios. In this paper, we derive upper bounds on the secure Key Rate for decoy state QKD. These bounds are based basically only on the classical correlations established by the legitimate users during the quantum communication phase of the protocol. The only assumption about the possible post-processing methods is that double click events are randomly assigned to single click events. Further we consider only secure Key Rates based on the uncalibRated device scenario which assigns imperfections such as detection inefficiency to the eavesdropper. Our analysis relies on two preconditions for secure two-way and one-way QKD: The legitimate users need to prove that there exists no separable state (in the case of two-way QKD), or that there exists no quantum state having a symmetric extension (one-way QKD), that is compatible with the available measurements results. Both criteria have been previously applied to evaluate single-photon implementations of QKD. Here we use them to investigate a realistic source of weak coherent pulses. The resulting upper bounds can be formulated as a convex optimization problem known as a semidefinite program which can be efficiently solved. For the standard four-state QKD protocol, they are quite close to known lower bounds, thus showing that there are clear limits to the further improvement of classical post-processing techniques in decoy state QKD.

  • one way quantum Key distribution simple upper bound on the secret Key Rate
    Physical Review A, 2006
    Co-Authors: Tobias Moroder, Marcos Curty, Norbert Lutkenhaus
    Abstract:

    We present a simple method to obtain an upper bound on the achievable secret Key Rate in quantum Key distribution (QKD) protocols that use only unidirectional classical communication during the public-discussion phase. This method is based on a necessary precondition for one-way secret Key distillation; the legitimate users need to prove that there exists no quantum state having a symmetric extension that is compatible with the available measurements results. The main advantage of the obtained upper bound is that it can be formulated as a semidefinite program, which can be efficiently solved. We illustRate our results by analyzing two well-known qubit-based QKD protocols: the four-state protocol and the six-state protocol.

  • Upper bound on the secret Key Rate distillable from effective quantum correlations with imperfect detectors
    Physical Review A, 2006
    Co-Authors: Tobias Moroder, Marcos Curty, Norbert Lutkenhaus
    Abstract:

    We provide a simple method to obtain an upper bound on the secret Key Rate that is particularly suited to analyze practical realizations of quantum Key distribution protocols with imperfect devices. We consider the so-called trusted device scenario where Eve cannot modify the actual detection devices employed by Alice and Bob. The upper bound obtained is based on the available measurements results, but it includes the effect of the noise and losses present in the detectors of the legitimate users.

Xiang-bin Wang - One of the best experts on this subject based on the ideXlab platform.

  • higher Key Rate of measurement device independent quantum Key distribution through joint data processing
    Physical Review A, 2021
    Co-Authors: Cong Jiang, Xiang-bin Wang
    Abstract:

    We propose a method named as double-scanning method, to improve the Key Rate of measurement-device-independent quantum Key distribution (MDI-QKD) drastically. In the method, two parameters are scanned simultaneously to tightened estimate the counts of single-photon pairs and the phase-flip error Rate jointly. Numerical results show that the method in this work can improve the Key Rate by $50\%-250\%$ in a typical experimental set-up. Besides, we study the optimization of MDI-QKD protocol with all parameters including the source parameters and failure probability parameters, over symmetric channel or asymmetric channel. Numerical results show that compared with the optimized results with only the source parameters, the all-parameter-optimization method could improve the Key Rate by about $10\%$.

  • sending or not sending twin field quantum Key distribution breaking the direct transmission Key Rate
    Physical Review A, 2020
    Co-Authors: Cong Jiang, Xiang-bin Wang
    Abstract:

    We present improved results of sending-or-not-sending twin-field quantum Key distribution by using error rejection through two-way classical communications. Our error rejection method, especially our method of actively odd-parity pairing (AOPP) can drastically improve the performance of sending-or-not-sending twin-field protocol in both secure distance and Key Rate. Taking a typical experimental parameter setting, our method here improves the secure distance by 70 km to more than 100 km in comparison with the prior art results. Comparative study also shows advantageous in Key Rates at regime of long distance and large misalignment error Rate for our method here. The numerical results show that our method here can significantly exceed the absolute limit of direct transmission Key Rate, and also have an advantageous Key Rates higher than various prior art results by 10 to 20 times.

  • Sending-or-not-sending twin-field quantum Key distribution: Breaking the direct transmission Key Rate
    Physical Review A, 2020
    Co-Authors: Cong Jiang, Xiang-bin Wang
    Abstract:

    We present improved method of sending-or-not-sending twin-field quantum Key distribution (SNS TF-QKD) based on its structure and the application of error rejection. %And we present iteration formula for bit-flip error Rate of the survived bits after error rejection. Taking the finite Key effect into consideration with only $10^{11}$ total pulses, we show that the method here exceeds the absolute limit of repeater-less Key Rate with whatever detection efficiency. We also make comparative study of different protocols numerically. It shows that the method here presents advantageous results at long distance regime and large noise regime, asymptotically or non-asymptotically. Applying the de Finetti theorem, we present the iteration formula of phase-flip error Rate for survived bits from odd-parity events only. With this, the performance of SNS protocol can be further improved a lot.

  • making the decoy state measurement device independent quantum Key distribution practically useful
    Physical Review A, 2016
    Co-Authors: Yiheng Zhou, Zongwen Yu, Xiang-bin Wang
    Abstract:

    The relatively low Key Rate seems to be the major barrier to its practical use for the decoy state measurement device independent quantum Key distribution (MDIQKD). We present a 4-intensity protocol for the decoy-state MDIQKD that hugely raises the Key Rate, especially in the case the total data size is not large. Also, calculation shows that our method makes it possible for secure private communication with {\em fresh} Keys geneRated from MDIQKD with a delay time of only a few seconds.

  • Tightened estimation can improve the Key Rate of MDI-QKD by more than $100\%$
    arXiv: Quantum Physics, 2013
    Co-Authors: Yiheng Zhou, Xiang-bin Wang
    Abstract:

    We present formulas to tightly upper bound the phase-flip errors in decoy state method by using 4 intensities. Our result compressed the bound to about a quarter of known result for MDI-QKD. Based on this, we find that the Key Rate is improved by more than $100\%$ given weak coherent state sources (WCS), and even more than $200\%$ with the heralded single-photon sources (HSPS).

Ryutaroh Matsumoto - One of the best experts on this subject based on the ideXlab platform.

Tomohiko Uyematsu - One of the best experts on this subject based on the ideXlab platform.