Boosted quantum and semi-quantum communication protocols

Rajni Bala,Sooryansh Asthana,V. Ravishankar
2023-05-08
Abstract:Secure quantum communication protocols based on a prepare-and-measure scheme employ mutually unbiased bases. In these protocols, many runs, in which different participants measure in different bases, simply go wasted. In this paper, we show that it is possible to reduce the number of such runs by a suitable design of the key generation rule. This results in a significant increase in the key generation rate (KGR). We illustrate this advantage by proposing quantum and semi-quantum key distribution protocols by employing effective qubits encoded in higher dimensional quantum systems. None of them demands the preparation of entangled states as resources and a relatively large amount of information can be transferred. For this reason, we believe that our proposals are worth pursuing experimentally.
Quantum Physics
What problem does this paper attempt to address?
The main problem that this paper attempts to solve is to increase the key generation rate (KGR) in quantum key distribution protocols (QKD) and semi - quantum key distribution protocols (SQKD). In traditional prepare - and - measure - type quantum communication protocols based on mutually unbiased bases (MUBs), when different participants use different bases for measurement, a large amount of data is wasted. This leads to the problem of a low key generation rate. In this paper, by designing a new key generation rule, this kind of data waste is reduced, thereby significantly increasing the key generation rate. ### Specific Problems and Solutions 1. **Reduce Data Waste**: - **Problem**: In traditional protocols, a key can be generated only when all participants choose the same base for measurement. Therefore, a large amount of data measured on different bases is discarded, resulting in a low key generation rate. - **Solution**: This paper proposes a new key generation rule so that data measured even on different bases can be used to generate a key. For example, in a four - dimensional system (ququart), when the sender and the receiver choose different bases, a partial key can still be generated. 2. **Increase Key Generation Rate**: - **Problem**: The key generation rates of traditional QKD and SQKD protocols are low, especially in high - dimensional systems. - **Solution**: By using effective qubits encoded in high - dimensional quantum systems, each transmission can carry more information bits, thereby increasing the key generation rate. Specifically, this paper proposes two new protocols: boosted quantum key distribution (bQKD) and boosted semi - quantum key distribution (bSQKD). ### Main Contributions 1. **Design of New Protocols**: - **bQKD**: In four - dimensional systems (ququart) and six - dimensional systems (quhex), by designing new key generation rules, the key generation rate is significantly increased. - **bSQKD**: In semi - quantum key distribution, by allowing the classical participant (Bob) to measure on the computational basis, a large amount of data waste is avoided, thereby increasing the key generation rate. 2. **Security Analysis**: - This paper analyzes in detail the robustness of the new protocols against various eavesdropping strategies, including subspace attacks, intercept - resend attacks, entanglement - measurement attacks, general entanglement attacks, photon - number - splitting attacks (PNS), and Trojan - horse attacks, etc. The results show that the new protocols still have high security under these attacks. 3. **Experimental Feasibility**: - The bases and states selected in this paper are not only easy to prepare but also have high fidelity, which makes the new protocols more experimentally feasible. ### Summary By designing new key generation rules and using effective qubits in high - dimensional quantum systems, this paper successfully solves the problem of low key generation rates in traditional quantum key distribution and semi - quantum key distribution. These new protocols not only increase the key generation rate but also maintain high security and have experimental feasibility.