Hasan Iqbal,Walter O. Krawec
Abstract:High-dimensional (HD) states are known to have several interesting properties when applied to quantum cryptography. For quantum key distribution (QKD), these states have the potential to improve noise tolerance and efficiency. However, creating, and measuring, HD states is technologically challenging, thus making it important to study HD-QKD protocols where Alice and Bob are restricted in their quantum capabilities. In this paper, we revisit a particular HD-QKD protocol, introduced in (PRA 97 (4):042347, 2018), which does not require Alice and Bob to be capable of sending and measuring in full mutually unbiased bases. In a way, the protocol is a HD version of the three state BB84: one full basis is used for key distillation, but only a single state is used, from an alternative basis, for testing the fidelity of the channel.
The previous proof of security for this protocol has relied on numerical methods, making it difficult to evaluate for high dimensions. In this work, we provide a new proof of security, and give an explicit key-rate equation for depolarization channels, allowing us to evaluate the key-rate for arbitrarily high dimensional states. Furthermore, our new proof produces better results than prior work for dimensions greater than eight, and shows that HD-states can benefit restricted protocols of this nature.
What problem does this paper attempt to address?
The problem that this paper attempts to solve is in high - dimensional quantum key distribution (QKD) protocols, how to provide a new security proof method under the condition of limiting the quantum capabilities of Alice and Bob, and evaluate its key rate in high dimensions. Specifically, the paper re - examines a specific high - dimensional QKD protocol, which was initially proposed in 2018 (PRA 97 (4):042347), and does not require Alice and Bob to be able to send and measure completely uncorrelated bases. This protocol can be regarded as a high - dimensional version of the three - state BB84 protocol: one complete basis is used for key extraction, and a single state in another basis is used to test the fidelity of the channel.
### Main contributions
1. **New security proof**:
- Provide a new, information - theoretic security analysis method, which is applicable to any noise model.
- For the depolarizing channel, derive an explicit analytical equation.
- For other channels, simplify the problem to solving the eigenvalues of a relatively simple matrix, which can be quickly completed by numerical methods.
2. **Key rate evaluation**:
- The new analysis method avoids the need for computational optimization and provides a method for quickly calculating the achievable key rate in any dimension.
- Compared with previous work, the new method provides better results when the dimension is greater than 8.
3. **Simplified protocol version**:
- Consider a simpler protocol version, in which Bob only needs to be able to distinguish a high - dimensional superposition state, thereby significantly simplifying his measurement device.
- This is of great significance for the experimental implementation of this protocol, because usually, it is relatively easy to distinguish all D basis states, while it is more technically challenging to distinguish all D basis states in another uncorrelated basis.
### Methods and techniques
- **Toy protocol**:
- Design a "toy" protocol and analyze its security.
- Use the continuity of von Neumann entropy to generalize the analysis of the toy protocol to the actual QKD protocol.
- **Continuity of von Neumann entropy**:
- Prove a new continuity bound of von Neumann entropy. Although it is only applicable to some forms of classical - quantum systems, its proof method may be useful for more general results in the future.
### Results
- **Key rate bounds**:
- Evaluate the key rate bounds of this protocol and compare them with previous work.
- Different from the trend of decreasing noise tolerance as the dimension increases shown in previous work, this paper proves that as the dimension increases, the noise tolerance actually shows an increasing trend.
- **Advantages of high - dimensional states**:
- Prove that high - dimensional states can indeed benefit from this restricted three - state - style protocol, which was an unsolved problem before.
- Since high - dimensional states also show theoretical performance advantages in other QKD protocols, this paper further reveals the potential benefits of high - dimensional states in "simple" protocols.
### Formula summary
- **Continuity bound of von Neumann entropy**:
\[
\Delta = |H(B_Z|E)_\rho - H(B_Z|E)_\sigma| \leq \epsilon \log |B_Z| + (1 + \epsilon) h\left(\frac{\epsilon}{1 + \epsilon}\right)
\]
where \(\epsilon \geq \frac{1}{2} \|\sigma_{BZE} - \rho_{BZE}\|_1\) is the upper bound of the trace distance between \(\sigma_{BZE}\) and \(\rho_{BZE}\), and \(|B_Z|\) is the size of Bob's measurement result set in the Z - basis, that is, \(D\).
- **Depolarizing channel**:
\[
E_q(\omega) = \left(1 - \frac{D}{D - 1}q\right)\omega+ \frac{q}{D - 1}I
\]
where \(I\) is the identity operator of dimension \(D\), and \(q\) is the noise parameter.
Through these contributions, the paper not only provides a new security proof method, but also shows the high - dimensional states in the restricted...