Skip to main content
Erschienen in: Quantum Information Processing 10/2021

01.10.2021

Analysis of a High-Dimensional Extended B92 Protocol

verfasst von: Hasan Iqbal, Walter O. Krawec

Erschienen in: Quantum Information Processing | Ausgabe 10/2021

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Quantum key distribution (QKD) allows two parties to establish a shared secret key that is secure against adversaries with unlimited computational power. One such protocol named B92 is quite appealing due to its simplicity but is highly sensitive to channel noise. In this work, we investigate a high-dimensional variant of an extended version of the B92 protocol and show that it can distill a key over high noise channels. The protocol we consider requires that Alice sends only three high-dimensional states and Bob only performs partial measurements. We perform an information-theoretic security analysis of our protocol and compare its key rate to that of a high-dimensional BB84 protocol over depolarization and amplitude damping channels.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Bennett, C.H., Brassard, G.: Quantum cryptography: Public key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, volume 175. New York, 1984 Bennett, C.H., Brassard, G.: Quantum cryptography: Public key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, volume 175. New York, 1984
2.
Zurück zum Zitat Pirandola, S., Andersen, U.L., Banchi, L., Berta, M., Bunandar, D., Colbeck, R., Englund, D., Gehring, T., Lupo, C., Ottaviani, C., et al.: Advances in quantum cryptography. Adv. Optics Photon. 12(4), 1012–1236 (2020)ADSCrossRef Pirandola, S., Andersen, U.L., Banchi, L., Berta, M., Bunandar, D., Colbeck, R., Englund, D., Gehring, T., Lupo, C., Ottaviani, C., et al.: Advances in quantum cryptography. Adv. Optics Photon. 12(4), 1012–1236 (2020)ADSCrossRef
3.
Zurück zum Zitat Scarani, V., Bechmann-Pasquinucci, H., Cerf, N.J., Dušek, M., Lütkenhaus, N., Peev, M.: The security of practical quantum key distribution. Rev. Mod. Phys. 81, 1301–1350 (2009)ADSCrossRef Scarani, V., Bechmann-Pasquinucci, H., Cerf, N.J., Dušek, M., Lütkenhaus, N., Peev, M.: The security of practical quantum key distribution. Rev. Mod. Phys. 81, 1301–1350 (2009)ADSCrossRef
4.
Zurück zum Zitat Shenoy-Hejamadi, A., Pathak, A., Radhakrishna, S.: Quantum cryptography: key distribution and beyond. Quanta 6(1), 1–47 (2017)MathSciNetCrossRef Shenoy-Hejamadi, A., Pathak, A., Radhakrishna, S.: Quantum cryptography: key distribution and beyond. Quanta 6(1), 1–47 (2017)MathSciNetCrossRef
6.
Zurück zum Zitat Tamaki, K., Koashi, M., Imoto, N.: Unconditionally secure key distribution based on two nonorthogonal states. Phys. Rev. Lett. 90(16), 167904 (2003)ADSCrossRef Tamaki, K., Koashi, M., Imoto, N.: Unconditionally secure key distribution based on two nonorthogonal states. Phys. Rev. Lett. 90(16), 167904 (2003)ADSCrossRef
7.
Zurück zum Zitat Matsumoto, R.: Improved asymptotic key rate of the b92 protocol. In: 2013 IEEE International Symposium on Information Theory, pages 351–353. IEEE, 2013 Matsumoto, R.: Improved asymptotic key rate of the b92 protocol. In: 2013 IEEE International Symposium on Information Theory, pages 351–353. IEEE, 2013
8.
Zurück zum Zitat Lucamarini, M., Giuseppe, D., Giovanni, T.K.: Robust unconditionally secure quantum key distribution with two nonorthogonal and uninformative states. Phys. Rev. A 80(3), 032327 (2009)ADSCrossRef Lucamarini, M., Giuseppe, D., Giovanni, T.K.: Robust unconditionally secure quantum key distribution with two nonorthogonal and uninformative states. Phys. Rev. A 80(3), 032327 (2009)ADSCrossRef
9.
Zurück zum Zitat Amer, Omar, Krawec, Walter O: Finite key analysis of the extended b92 protocol. In: 2020 IEEE International Symposium on Information Theory (ISIT), pages 1944–1948. IEEE, 2020 Amer, Omar, Krawec, Walter O: Finite key analysis of the extended b92 protocol. In: 2020 IEEE International Symposium on Information Theory (ISIT), pages 1944–1948. IEEE, 2020
10.
Zurück zum Zitat Cozzolino, D., Lio, D., Beatrice, B., Davide, O., Leif, K.: High-dimensional quantum communication: benefits, progress, and future challenges. Adv. Quant. Technol. 2(12), 1900038 (2019)CrossRef Cozzolino, D., Lio, D., Beatrice, B., Davide, O., Leif, K.: High-dimensional quantum communication: benefits, progress, and future challenges. Adv. Quant. Technol. 2(12), 1900038 (2019)CrossRef
12.
Zurück zum Zitat Chau, H.F.: Unconditionally secure key distribution in higher dimensions by depolarization. IEEE Trans. Inf. Theory 51(4), 1451–1468 (2005)MathSciNetCrossRef Chau, H.F.: Unconditionally secure key distribution in higher dimensions by depolarization. IEEE Trans. Inf. Theory 51(4), 1451–1468 (2005)MathSciNetCrossRef
13.
Zurück zum Zitat Sheridan, L., Scarani, V.: Security proof for quantum key distribution using qudit systems. Phys. Rev. A 82(3), 030301 (2010)ADSCrossRef Sheridan, L., Scarani, V.: Security proof for quantum key distribution using qudit systems. Phys. Rev. A 82(3), 030301 (2010)ADSCrossRef
14.
Zurück zum Zitat Vlachou, C., Krawec, W., Mateus, P., Paunković, N., Souto, A.: Quantum key distribution with quantum walks. Quant. Inf. Process. 17(11), 1–37 (2018)MathSciNetCrossRef Vlachou, C., Krawec, W., Mateus, P., Paunković, N., Souto, A.: Quantum key distribution with quantum walks. Quant. Inf. Process. 17(11), 1–37 (2018)MathSciNetCrossRef
15.
Zurück zum Zitat Sasaki, T., Yamamoto, Y., Koashi, M.: Practical quantum key distribution protocol without monitoring signal disturbance. Nature 509(7501), 475–478 (2014)ADSCrossRef Sasaki, T., Yamamoto, Y., Koashi, M.: Practical quantum key distribution protocol without monitoring signal disturbance. Nature 509(7501), 475–478 (2014)ADSCrossRef
16.
Zurück zum Zitat Wang, F., Zeng, P., Zhao, J., Braverman, B., Zhou, Y., Mirhosseini, M., Wang, X., Gao, H., Li, F., Boyd, R.W., et al.: High-dimensional quantum key distribution based on mutually partially unbiased bases. Phys. Rev. A 101(3), 032340 (2020)ADSCrossRef Wang, F., Zeng, P., Zhao, J., Braverman, B., Zhou, Y., Mirhosseini, M., Wang, X., Gao, H., Li, F., Boyd, R.W., et al.: High-dimensional quantum key distribution based on mutually partially unbiased bases. Phys. Rev. A 101(3), 032340 (2020)ADSCrossRef
17.
Zurück zum Zitat Islam, N.T., Lim, C.C., Cahall, C., Kim, J., Gauthier, D.J.: Provably secure and high-rate quantum key distribution with time-bin qudits. Sci. Adv. 3(11), e1701491 (2017)ADSCrossRef Islam, N.T., Lim, C.C., Cahall, C., Kim, J., Gauthier, D.J.: Provably secure and high-rate quantum key distribution with time-bin qudits. Sci. Adv. 3(11), e1701491 (2017)ADSCrossRef
18.
Zurück zum Zitat Mower, J., Zhang, Z., Desjardins, P., Lee, C., Shapiro, J.H., Englund, D.: High-dimensional quantum key distribution using dispersive optics. Phys. Rev. A 87(6), 062322 (2013)ADSCrossRef Mower, J., Zhang, Z., Desjardins, P., Lee, C., Shapiro, J.H., Englund, D.: High-dimensional quantum key distribution using dispersive optics. Phys. Rev. A 87(6), 062322 (2013)ADSCrossRef
19.
Zurück zum Zitat Da Lio, B, Cozzolino, D, Biagi, N, Ding, Y, Rottwitt, K, Zavatta, D Bacco, A, Oxenløwe, LK: Path-encoded high-dimensional quantum communication over a 2 km multicore fiber. arXiv preprintarXiv:2103.05992, 2021 Da Lio, B, Cozzolino, D, Biagi, N, Ding, Y, Rottwitt, K, Zavatta, D Bacco, A, Oxenløwe, LK: Path-encoded high-dimensional quantum communication over a 2 km multicore fiber. arXiv preprintarXiv:​2103.​05992, 2021
20.
Zurück zum Zitat Lee, C Bunandar, D, Zhang Z, Steinbrecher, GR, Dixon, PB, Wong, FN, Shapiro, JH, Hamilton, SA, Englund, D, : Large-alphabet encoding for higher-rate quantum key distribution. Optics Exp. 27(13), 17539–17549 (2019) Lee, C Bunandar, D, Zhang Z, Steinbrecher, GR, Dixon, PB, Wong, FN, Shapiro, JH, Hamilton, SA, Englund, D, : Large-alphabet encoding for higher-rate quantum key distribution. Optics Exp. 27(13), 17539–17549 (2019)
21.
Zurück zum Zitat Krawec, W.O.: Quantum key distribution with mismatched measurements over arbitrary channels. Quant. Inf. Comput. 17(3 & 4), 209–241 (2017)MathSciNet Krawec, W.O.: Quantum key distribution with mismatched measurements over arbitrary channels. Quant. Inf. Comput. 17(3 & 4), 209–241 (2017)MathSciNet
22.
Zurück zum Zitat Barnett, S.M., Huttner, B., Phoenix, S.J.D.: Eavesdropping strategies and rejected-data protocols in quantum cryptography. J. Modern Optics 40(12), 2501–2513 (1993)ADSCrossRef Barnett, S.M., Huttner, B., Phoenix, S.J.D.: Eavesdropping strategies and rejected-data protocols in quantum cryptography. J. Modern Optics 40(12), 2501–2513 (1993)ADSCrossRef
23.
Zurück zum Zitat Watanabe, S., Matsumoto, R., Uyematsu, T.: Tomography increases key rates of quantum-key-distribution protocols. Phys. Rev. A 78(4), 042316 (2008)ADSCrossRef Watanabe, S., Matsumoto, R., Uyematsu, T.: Tomography increases key rates of quantum-key-distribution protocols. Phys. Rev. A 78(4), 042316 (2008)ADSCrossRef
24.
Zurück zum Zitat Matsumoto, R., Watanabe, S.: Key rate available from mismatched measurements in the bb84 protocol and the uncertainty principle. IEICE Trans. Fund. Electron. Commun. Comp. Sci. 91(10), 2870–2873 (2008)CrossRef Matsumoto, R., Watanabe, S.: Key rate available from mismatched measurements in the bb84 protocol and the uncertainty principle. IEICE Trans. Fund. Electron. Commun. Comp. Sci. 91(10), 2870–2873 (2008)CrossRef
25.
Zurück zum Zitat Krawec, Walter O: Asymptotic analysis of a three state quantum cryptographic protocol. In: 2016 IEEE International Symposium on Information Theory (ISIT), pp. 2489–2493. IEEE, 2016 Krawec, Walter O: Asymptotic analysis of a three state quantum cryptographic protocol. In: 2016 IEEE International Symposium on Information Theory (ISIT), pp. 2489–2493. IEEE, 2016
26.
Zurück zum Zitat Tamaki, K., Curty, M., Kato, G., Lo, H.K., Azuma, K.: Loss-tolerant quantum cryptography with imperfect sources. Phys. Rev. A 90(5), 052314 (2014)ADSCrossRef Tamaki, K., Curty, M., Kato, G., Lo, H.K., Azuma, K.: Loss-tolerant quantum cryptography with imperfect sources. Phys. Rev. A 90(5), 052314 (2014)ADSCrossRef
27.
Zurück zum Zitat König, R., Renner, R.: A de finetti representation for finite symmetric quantum states. J. Math. Phys. 46(12), 122108 (2005)ADSMathSciNetCrossRef König, R., Renner, R.: A de finetti representation for finite symmetric quantum states. J. Math. Phys. 46(12), 122108 (2005)ADSMathSciNetCrossRef
28.
Zurück zum Zitat Christandl, M., König, R., Renner, R.: Postselection technique for quantum channels with applications to quantum cryptography. Phys. Rev. Lett. 102(2), 020504 (2009)ADSCrossRef Christandl, M., König, R., Renner, R.: Postselection technique for quantum channels with applications to quantum cryptography. Phys. Rev. Lett. 102(2), 020504 (2009)ADSCrossRef
29.
Zurück zum Zitat Devetak, I., Winter, A.: Distillation of secret key and entanglement from quantum states. Proc. R. Soc. A Math. Phys. Eng. Sci. 461(2053), 207–235 (2005)ADSMathSciNetMATH Devetak, I., Winter, A.: Distillation of secret key and entanglement from quantum states. Proc. R. Soc. A Math. Phys. Eng. Sci. 461(2053), 207–235 (2005)ADSMathSciNetMATH
30.
Zurück zum Zitat Renner, R., Gisin, N., Nicolas, K., Kraus, B.: Information-theoretic security proof for quantum-key-distribution protocols. Phys. Rev. A 72(1), 012332 (2005)ADSCrossRef Renner, R., Gisin, N., Nicolas, K., Kraus, B.: Information-theoretic security proof for quantum-key-distribution protocols. Phys. Rev. A 72(1), 012332 (2005)ADSCrossRef
31.
Zurück zum Zitat Fannes, M.: A continuity property of the entropy density for spin lattice systems. Commun. Math. Phys. 31(4), 291–294 (1973)ADSMathSciNetCrossRef Fannes, M.: A continuity property of the entropy density for spin lattice systems. Commun. Math. Phys. 31(4), 291–294 (1973)ADSMathSciNetCrossRef
32.
33.
Zurück zum Zitat Winter, A.: Tight uniform continuity bounds for quantum entropies: conditional entropy, relative entropy distance and energy constraints. Commun. Math. Phys. 347(1), 291–313 (2016)ADSMathSciNetCrossRef Winter, A.: Tight uniform continuity bounds for quantum entropies: conditional entropy, relative entropy distance and energy constraints. Commun. Math. Phys. 347(1), 291–313 (2016)ADSMathSciNetCrossRef
34.
Zurück zum Zitat Tamaki, K., Lütkenhaus, N.: Unconditional security of the bennett 1992 quantum key-distribution protocol over a lossy and noisy channel. Phys. Rev. A 69(3), 032316 (2004)ADSCrossRef Tamaki, K., Lütkenhaus, N.: Unconditional security of the bennett 1992 quantum key-distribution protocol over a lossy and noisy channel. Phys. Rev. A 69(3), 032316 (2004)ADSCrossRef
35.
Zurück zum Zitat Scarani, V., Renner, R.: Quantum cryptography with finite resources: unconditional security bound for discrete-variable protocols with one-way postprocessing. Phys. Rev. Lett. 100(20), 200501 (2008)ADSCrossRef Scarani, V., Renner, R.: Quantum cryptography with finite resources: unconditional security bound for discrete-variable protocols with one-way postprocessing. Phys. Rev. Lett. 100(20), 200501 (2008)ADSCrossRef
36.
Zurück zum Zitat Cerf, N.J., Bourennane, M., Karlsson, A., Gisin, N.: Security of quantum key distribution using d-level systems. Phys. Rev. Lett. 88(12), 127902 (2002)ADSCrossRef Cerf, N.J., Bourennane, M., Karlsson, A., Gisin, N.: Security of quantum key distribution using d-level systems. Phys. Rev. Lett. 88(12), 127902 (2002)ADSCrossRef
37.
Zurück zum Zitat Shor, P.W., Preskill, J.: Simple proof of security of the bb84 quantum key distribution protocol. Phys. Rev. Lett. 85, 441–444 (2000)ADSCrossRef Shor, P.W., Preskill, J.: Simple proof of security of the bb84 quantum key distribution protocol. Phys. Rev. Lett. 85, 441–444 (2000)ADSCrossRef
38.
Zurück zum Zitat Koashi, M.: Simple security proof of quantum key distribution based on complementarity. New J. Phys. 11(4), 045018 (2009)ADSMathSciNetCrossRef Koashi, M.: Simple security proof of quantum key distribution based on complementarity. New J. Phys. 11(4), 045018 (2009)ADSMathSciNetCrossRef
39.
Zurück zum Zitat Berta, M., Christandl, M., Colbeck, R., Renes, J.M., Renner, R.: The uncertainty principle in the presence of quantum memory. Nature Phys. 6(9), 659–662 (2010)ADSCrossRef Berta, M., Christandl, M., Colbeck, R., Renes, J.M., Renner, R.: The uncertainty principle in the presence of quantum memory. Nature Phys. 6(9), 659–662 (2010)ADSCrossRef
40.
42.
Zurück zum Zitat Fonseca, A.: High-dimensional quantum teleportation under noisy environments. Phys. Rev. A 100(6), 062311 (2019)ADSCrossRef Fonseca, A.: High-dimensional quantum teleportation under noisy environments. Phys. Rev. A 100(6), 062311 (2019)ADSCrossRef
43.
Zurück zum Zitat Grassl, M., Kong, L., Wei, Z., Yin, Z.-Q., Zeng, B.: Quantum error-correcting codes for qudit amplitude damping. IEEE Trans. Inf. Theory 64(6), 4674–4685 (2018)MathSciNetCrossRef Grassl, M., Kong, L., Wei, Z., Yin, Z.-Q., Zeng, B.: Quantum error-correcting codes for qudit amplitude damping. IEEE Trans. Inf. Theory 64(6), 4674–4685 (2018)MathSciNetCrossRef
Metadaten
Titel
Analysis of a High-Dimensional Extended B92 Protocol
verfasst von
Hasan Iqbal
Walter O. Krawec
Publikationsdatum
01.10.2021
Verlag
Springer US
Erschienen in
Quantum Information Processing / Ausgabe 10/2021
Print ISSN: 1570-0755
Elektronische ISSN: 1573-1332
DOI
https://doi.org/10.1007/s11128-021-03276-w

Weitere Artikel der Ausgabe 10/2021

Quantum Information Processing 10/2021 Zur Ausgabe