21,995 research outputs found
Security proof of a three-state quantum key distribution protocol without rotational symmetry
Standard security proofs of quantum key distribution (QKD) protocols often
rely on symmetry arguments. In this paper, we prove the security of a
three-state protocol that does not possess rotational symmetry. The three-state
QKD protocol we consider involves three qubit states, where the first two
states, |0_z> and |1_z>, can contribute to key generation and the third state,
|+>=(|0_z>+|1_z>)/\sqrt{2}, is for channel estimation. This protocol has been
proposed and implemented experimentally in some frequency-based QKD systems
where the three states can be prepared easily. Thus, by founding on the
security of this three-state protocol, we prove that these QKD schemes are, in
fact, unconditionally secure against any attacks allowed by quantum mechanics.
The main task in our proof is to upper bound the phase error rate of the qubits
given the bit error rates observed. Unconditional security can then be proved
not only for the ideal case of a single-photon source and perfect detectors,
but also for the realistic case of a phase-randomized weak coherent light
source and imperfect threshold detectors. Our result on the phase error rate
upper bound is independent of the loss in the channel. Also, we compare the
three-state protocol with the BB84 protocol. For the single-photon source case,
our result proves that the BB84 protocol strictly tolerates a higher quantum
bit error rate than the three-state protocol; while for the coherent-source
case, the BB84 protocol achieves a higher key generation rate and secure
distance than the three-state protocol when a decoy-state method is used.Comment: 10 pages, 3 figures, 2 column
Kerncraft: A Tool for Analytic Performance Modeling of Loop Kernels
Achieving optimal program performance requires deep insight into the
interaction between hardware and software. For software developers without an
in-depth background in computer architecture, understanding and fully utilizing
modern architectures is close to impossible. Analytic loop performance modeling
is a useful way to understand the relevant bottlenecks of code execution based
on simple machine models. The Roofline Model and the Execution-Cache-Memory
(ECM) model are proven approaches to performance modeling of loop nests. In
comparison to the Roofline model, the ECM model can also describes the
single-core performance and saturation behavior on a multicore chip. We give an
introduction to the Roofline and ECM models, and to stencil performance
modeling using layer conditions (LC). We then present Kerncraft, a tool that
can automatically construct Roofline and ECM models for loop nests by
performing the required code, data transfer, and LC analysis. The layer
condition analysis allows to predict optimal spatial blocking factors for loop
nests. Together with the models it enables an ab-initio estimate of the
potential benefits of loop blocking optimizations and of useful block sizes. In
cases where LC analysis is not easily possible, Kerncraft supports a cache
simulator as a fallback option. Using a 25-point long-range stencil we
demonstrate the usefulness and predictive power of the Kerncraft tool.Comment: 22 pages, 5 figure
Practical Evaluation of Security for Quantum Key Distribution
Many papers proved the security of quantum key distribution (QKD) system, in
the asymptotic framework. The degree of the security has not been discussed in
the finite coding-length framework, sufficiently. However, to guarantee any
implemented QKD system requires, it is needed to evaluate a protocol with a
finite coding-length. For this purpose, we derive a tight upper bound of the
eavesdropper's information. This bound is better than existing bounds. We also
obtain the exponential rate of the eavesdropper's information. Further, we
approximate our bound by using the normal distribution.Comment: The manuscript has been modfie
Upper bounds for the secure key rate of decoy state quantum key distribution
The use of decoy states in quantum key distribution (QKD) has provided a
method for substantially increasing the secret key rate and distance that can
be covered by QKD protocols with practical signals. The security analysis of
these schemes, however, leaves open the possibility that the development of
better proof techniques, or better classical post-processing methods, might
further improve their performance in realistic scenarios. In this paper, we
derive upper bounds on the secure key rate for decoy state QKD. These bounds
are based basically only on the classical correlations established by the
legitimate users during the quantum communication phase of the protocol. The
only assumption about the possible post-processing methods is that double click
events are randomly assigned to single click events. Further we consider only
secure key rates based on the uncalibrated device scenario which assigns
imperfections such as detection inefficiency to the eavesdropper. Our analysis
relies on two preconditions for secure two-way and one-way QKD: The legitimate
users need to prove that there exists no separable state (in the case of
two-way QKD), or that there exists no quantum state having a symmetric
extension (one-way QKD), that is compatible with the available measurements
results. Both criteria have been previously applied to evaluate single-photon
implementations of QKD. Here we use them to investigate a realistic source of
weak coherent pulses. The resulting upper bounds can be formulated as a convex
optimization problem known as a semidefinite program which can be efficiently
solved. For the standard four-state QKD protocol, they are quite close to known
lower bounds, thus showing that there are clear limits to the further
improvement of classical post-processing techniques in decoy state QKD.Comment: 10 pages, 3 figure
Undetermined states: how to find them and their applications
We investigate the undetermined sets consisting of two-level, multi-partite
pure quantum states, whose reduced density matrices give absolutely no
information of their original states. Two approached of finding these quantum
states are proposed. One is to establish the relation between codewords of the
stabilizer quantum error correction codes (SQECCs) and the undetermined states.
The other is to study the local complementation rules of the graph states. As
an application, the undetermined states can be exploited in the quantum secret
sharing scheme. The security is guaranteed by their undetermineness.Comment: 6 pages, no figur
Time-dependent Hamiltonian estimation for Doppler velocimetry of trapped ions
The time evolution of a closed quantum system is connected to its Hamiltonian
through Schroedinger's equation. The ability to estimate the Hamiltonian is
critical to our understanding of quantum systems, and allows optimization of
control. Though spectroscopic methods allow time-independent Hamiltonians to be
recovered, for time-dependent Hamiltonians this task is more challenging. Here,
using a single trapped ion, we experimentally demonstrate a method for
estimating a time-dependent Hamiltonian of a single qubit. The method involves
measuring the time evolution of the qubit in a fixed basis as a function of a
time-independent offset term added to the Hamiltonian. In our system the
initially unknown Hamiltonian arises from transporting an ion through a static,
near-resonant laser beam. Hamiltonian estimation allows us to estimate the
spatial dependence of the laser beam intensity and the ion's velocity as a
function of time. This work is of direct value in optimizing transport
operations and transport-based gates in scalable trapped ion quantum
information processing, while the estimation technique is general enough that
it can be applied to other quantum systems, aiding the pursuit of high
operational fidelities in quantum control.Comment: 10 pages, 8 figure
Quantum key distribution with "dual detectors"
To improve the performance of a quantum key distribution (QKD) system, high
speed, low dark count single photon detectors (or low noise homodyne detectors)
are required. However, in practice, a fast detector is usually noisy. Here, we
propose a "dual detectors" method to improve the performance of a practical QKD
system with realistic detectors: the legitimate receiver randomly uses either a
fast (but noisy) detector or a quiet (but slow) detector to measure the
incoming quantum signals. The measurement results from the quiet detector can
be used to bound eavesdropper's information, while the measurement results from
the fast detector are used to generate secure key. We apply this idea to
various QKD protocols. Simulation results demonstrate significant improvements
in both BB84 protocol with ideal single photon source and Gaussian-modulated
coherent states (GMCS) protocol; while for decoy-state BB84 protocol with weak
coherent source, the improvement is moderate. We also discuss various practical
issues in implementing the "dual detectors" scheme.Comment: 22 pages, 9 figure
- …