Compare Papers
Paper 1
Simple efficient decoders for quantum key distribution over quantum repeaters with encoding
Yumang Jing, Mohsen Razavi
- Year
- 2020
- Journal
- arXiv preprint
- DOI
- arXiv:2012.13011
- arXiv
- 2012.13011
We study the implementation of quantum key distribution (QKD) systems over quantum repeater infrastructures. We particularly consider quantum repeaters with encoding and compare them with probabilistic quantum repeaters. To that end, we propose two decoder structures for encoded repeaters that not only improve system performance but also make the implementation aspects easier by removing two-qubit gates from the QKD decoder. By developing several scalable numerical and analytical techniques, we then identify the resilience of the setup to various sources of error in gates, measurement modules, and initialization of the setup. We apply our techniques to three- and five-qubit repetition codes and obtain the normalized secret key generation rate per memory per second for encoded and probabilistic quantum repeaters. We quantify the regimes of operation, where one class of repeater outperforms the other, and find that there are feasible regimes of operation where encoded repeaters -- based on simple three-qubit repetition codes -- could offer practical advantages.
Open paperPaper 2
Lightweight Quantum Security Protocols
Tzonelih Hwang, Yen-Jie Chen, Chia-Wei Tsai, Cheng-Ching Kuo
- Year
- 2020
- Journal
- arXiv preprint
- DOI
- arXiv:2007.05804
- arXiv
- 2007.05804
Inspired by the semi-quantum protocols, this paper defines the lightweight quantum security protocols, in which lightweight participants can only operate two out of four very lightweight quantum operations. Subsequently, this study proposes a Lightweight Mediated Quantum Key Distribution (LMQKD) protocol as an example to disclose the feasibility and advantage of the lightweight quantum protocol. In the proposed protocol, a dishonest third party (TP) with complete quantum capabilities helps two lightweight quantum users establish a secure key. The lightweight quantum users are allowed to perform only: (1) unitary operations and (2) reflecting qubits without disturbance. The proposed protocol has been showed to be robust under the collective attack.
Open paper