Jasminder Sidhu
@jassidhu.bsky.social
Quantum Information Theorist.
February 3, 2025 at 10:24 PM
The new security proof may be useful in exploring higher-dimensional QKD, and the invariant states may help with other use cases, such as semi-device-independent protocols.
iopscience.iop.org/article/10.1...
iopscience.iop.org/article/10.1...
Security of hybrid BB84 with heterodyne detection - IOPscienceSearch
Security of hybrid BB84 with heterodyne detection, Sidhu, Jasminder S, Maggi, Rocco, Pascazio, Saverio, Lupo, Cosmo
iopscience.iop.org
February 3, 2025 at 10:24 PM
The new security proof may be useful in exploring higher-dimensional QKD, and the invariant states may help with other use cases, such as semi-device-independent protocols.
iopscience.iop.org/article/10.1...
iopscience.iop.org/article/10.1...
Our security proof gives some improvement in rates and robustness to noise.
Intuition: single-photon based hybrid protocols are suitable for metropolitan-scale communications.
Intuition: single-photon based hybrid protocols are suitable for metropolitan-scale communications.
February 3, 2025 at 10:24 PM
Our security proof gives some improvement in rates and robustness to noise.
Intuition: single-photon based hybrid protocols are suitable for metropolitan-scale communications.
Intuition: single-photon based hybrid protocols are suitable for metropolitan-scale communications.
3) Our rate optimiser is closely aligned to experimental implementation.
We analytically derive the asymptotic rate for different quantum channels to give insights into current implementation readiness.
We analytically derive the asymptotic rate for different quantum channels to give insights into current implementation readiness.
February 3, 2025 at 10:24 PM
3) Our rate optimiser is closely aligned to experimental implementation.
We analytically derive the asymptotic rate for different quantum channels to give insights into current implementation readiness.
We analytically derive the asymptotic rate for different quantum channels to give insights into current implementation readiness.
2) We derive invariant states that permit a quadratic numerical speedup in the key rate optimisation.
This allows efficient rate calculation for a large-dimensional system.
This allows efficient rate calculation for a large-dimensional system.
February 3, 2025 at 10:24 PM
2) We derive invariant states that permit a quadratic numerical speedup in the key rate optimisation.
This allows efficient rate calculation for a large-dimensional system.
This allows efficient rate calculation for a large-dimensional system.
1) our protocol eliminates the need for sifting and a shared local oscillator, removing the need for calibration and simplifying implementation.
Security vulnerabilities that target transmitted LO are also removed.
Security vulnerabilities that target transmitted LO are also removed.
February 3, 2025 at 10:24 PM
1) our protocol eliminates the need for sifting and a shared local oscillator, removing the need for calibration and simplifying implementation.
Security vulnerabilities that target transmitted LO are also removed.
Security vulnerabilities that target transmitted LO are also removed.
The hybrid protocol assimilates the best features of DV and CV protocols.
Encoding is in DV and decoding through heterodyne detection, similar to the proposal by Bing Qi: PRA 103, 012606 (2021).
Our work has a number of advantages ...
Encoding is in DV and decoding through heterodyne detection, similar to the proposal by Bing Qi: PRA 103, 012606 (2021).
Our work has a number of advantages ...
February 3, 2025 at 10:24 PM
The hybrid protocol assimilates the best features of DV and CV protocols.
Encoding is in DV and decoding through heterodyne detection, similar to the proposal by Bing Qi: PRA 103, 012606 (2021).
Our work has a number of advantages ...
Encoding is in DV and decoding through heterodyne detection, similar to the proposal by Bing Qi: PRA 103, 012606 (2021).
Our work has a number of advantages ...