Quantum Key Distribution with State Replacement

Michael Graifer*, Yuval Kochman, Ofer Shayevitz

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Quantum key distribution protocols have been studied for almost four decades, and have already seen real world applications. Such implementations often operate in naturally noisy environments (e.g., sensor thermal noise, sun radiation, etc.) with known or measurable noise levels. However, existing security proofs implicitly attribute any channel noise to a possible eavesdropper, an overly pessimistic assumption that can adversely effect the guaranteed protocol key-rate. In this paper, we analyze general prepare-and-measure QKD schemes, and show how to improve the bounds on the key-rate under the assumption of an independent state replacement noise at the receiver. Taking BB84 as a concrete example, our results theoretically guarantee a higher key-rate, as a function of the minimal possible replacement probability. In practice, for some parameter-regimes, this guarantees a higher tolerable QBER.

Original languageEnglish
Title of host publication2023 59th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2023
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages1-8
Number of pages8
ISBN (Electronic)9798350328141
DOIs
StatePublished - 2023
Event59th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2023 - Monticello, United States
Duration: 26 Sep 202329 Sep 2023

Publication series

Name2023 59th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2023

Conference

Conference59th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2023
Country/TerritoryUnited States
CityMonticello
Period26/09/2329/09/23

Bibliographical note

Publisher Copyright:
© 2023 IEEE.

Fingerprint

Dive into the research topics of 'Quantum Key Distribution with State Replacement'. Together they form a unique fingerprint.

Cite this