Compare Papers

Paper 1

Simple efficient decoders for quantum key distribution over quantum repeaters with encoding

Yumang Jing, Mohsen Razavi

Year
2020
Journal
arXiv preprint
DOI
arXiv:2012.13011
arXiv
2012.13011

We study the implementation of quantum key distribution (QKD) systems over quantum repeater infrastructures. We particularly consider quantum repeaters with encoding and compare them with probabilistic quantum repeaters. To that end, we propose two decoder structures for encoded repeaters that not only improve system performance but also make the implementation aspects easier by removing two-qubit gates from the QKD decoder. By developing several scalable numerical and analytical techniques, we then identify the resilience of the setup to various sources of error in gates, measurement modules, and initialization of the setup. We apply our techniques to three- and five-qubit repetition codes and obtain the normalized secret key generation rate per memory per second for encoded and probabilistic quantum repeaters. We quantify the regimes of operation, where one class of repeater outperforms the other, and find that there are feasible regimes of operation where encoded repeaters -- based on simple three-qubit repetition codes -- could offer practical advantages.

Open paper

Paper 2

Lightweight Quantum Security Protocols

Tzonelih Hwang, Yen-Jie Chen, Chia-Wei Tsai, Cheng-Ching Kuo

Year
2020
Journal
arXiv preprint
DOI
arXiv:2007.05804
arXiv
2007.05804

Inspired by the semi-quantum protocols, this paper defines the lightweight quantum security protocols, in which lightweight participants can only operate two out of four very lightweight quantum operations. Subsequently, this study proposes a Lightweight Mediated Quantum Key Distribution (LMQKD) protocol as an example to disclose the feasibility and advantage of the lightweight quantum protocol. In the proposed protocol, a dishonest third party (TP) with complete quantum capabilities helps two lightweight quantum users establish a secure key. The lightweight quantum users are allowed to perform only: (1) unitary operations and (2) reflecting qubits without disturbance. The proposed protocol has been showed to be robust under the collective attack.

Open paper