<div class="csl-bib-body">
<div class="csl-entry">Bhattacharyya, A., George, I., Kanitschar, F. P., & Lutkenhaus, N. (2024, September 5). <i>Security against coherent attacks in discrete-modulated continuous-variable quantum key distribution</i> [Poster Presentation]. QCrypt 2024, Vigo, Spain. http://hdl.handle.net/20.500.12708/203044</div>
</div>
-
dc.identifier.uri
http://hdl.handle.net/20.500.12708/203044
-
dc.description.abstract
Discrete-Modulated Continuous-Variable Quantum Key Distribution (DMCVQKD) protocols are amenable for deployment in quantum communication networks due to their experimental simplicity, but pose theoretical challenges impeding their tight security analyses. Major progress has recently been made in the finite-size regime against independent and identical (iid) collective attacks (Kanitschar, F. et. al., (2023), PRX Quantum, 4(4), p.040306). However, a complete and rigorous analysis must take into account correlated rounds of attack beyond the iid-collective assumption, and must not assume a photon-number cutoff on the signal states. The difficulty of achieving this lies in the absence of an information-theoretic framework for proving security that handles infinite dimensional multipartite quantum states that are a priori unstructured, i.e., beyond the asymptotic iid setting. We present a composable security proof against coherent attacks in the finite-size regime for a general DMCVQKD protocol. We introduce a framework to handle states that are in part iid and in part unstructured (almost iid) in infinite dimensional Hilbert spaces. We use a de Finetti reduction for infinite dimensional almost iid states (Renner, R., Cirac, J. I., Phys. Rev. Lett. 102, 110504 (2009)), and generalise the acceptance test and the energy test to almost iid states handling Eve’s correlated infinite dimensional side information. As work in progress, we address the issue of a missing chain rule that formulates an explicit key rate expression. Numerical simulation of key rates (Winick, A. et. al., Quantum 2, 77 (2018)) can then be performed, demonstrating the efficacy of the security proof.
en
dc.language.iso
en
-
dc.subject
QKD
en
dc.subject
Quantum Key Distribution
en
dc.subject
Quantum Communication
en
dc.subject
Quantum Information
en
dc.subject
Quantum Technology
en
dc.title
Security against coherent attacks in discrete-modulated continuous-variable quantum key distribution
en
dc.type
Presentation
en
dc.type
Vortrag
de
dc.contributor.affiliation
University of Waterloo, Canada
-
dc.contributor.affiliation
National University of Singapore, Singapore
-
dc.contributor.affiliation
University of Waterloo, Canada
-
dc.type.category
Poster Presentation
-
tuw.researchTopic.id
Q3
-
tuw.researchTopic.id
Q1
-
tuw.researchTopic.name
Quantum Modeling and Simulation
-
tuw.researchTopic.name
Photonics
-
tuw.researchTopic.value
50
-
tuw.researchTopic.value
50
-
tuw.publication.orgunit
E141-08 - Forschungsbereich Quantum Optics and Quantum Information