-
Enhancing key rates of QKD protocol by Coincidence Detection
Authors:
Tanya Sharma,
Rutvij Bhavsar,
Jayanth Ramakrishnan,
Pooja Chandravanshi,
Shashi Prabhakar,
Ayan Biswas,
R. P. Singh
Abstract:
In theory, quantum key distribution (QKD) provides unconditional security; however, its practical implementations are susceptible to exploitable vulnerabilities. This investigation tackles the constraints in practical QKD implementations using weak coherent pulses. We improve on the conventional approach of using decoy pulses by integrating it with the coincidence detection (CD) protocol. Addition…
▽ More
In theory, quantum key distribution (QKD) provides unconditional security; however, its practical implementations are susceptible to exploitable vulnerabilities. This investigation tackles the constraints in practical QKD implementations using weak coherent pulses. We improve on the conventional approach of using decoy pulses by integrating it with the coincidence detection (CD) protocol. Additionally, we introduce an easy-to-implement algorithm to compute asymptotic key rates for the protocol. Furthermore, we have carried out an experimental implementation of the protocol, where we demonstrate that monitoring coincidences in the decoy state protocol leads to enhanced key rates under realistic experimental conditions.
△ Less
Submitted 10 May, 2024; v1 submitted 29 February, 2024;
originally announced February 2024.
-
Comment on a no-go theorem for $ψ$-ontic models
Authors:
Laurens Walleghem,
Shashaank Khanna,
Rutvij Bhavsar
Abstract:
In a recent paper [Carcassi, Oldofredi and Aidala, Found Phys 54, 14 (2024)] it is claimed that the whole Harrigan--Spekkens framework of ontological models is inconsistent with quantum theory. They show this by showing that all pure quantum states in $ψ$-ontic models must be orthogonal. In this note, we identify some crucial mistakes in their argument to the extent that the main claim is incorrec…
▽ More
In a recent paper [Carcassi, Oldofredi and Aidala, Found Phys 54, 14 (2024)] it is claimed that the whole Harrigan--Spekkens framework of ontological models is inconsistent with quantum theory. They show this by showing that all pure quantum states in $ψ$-ontic models must be orthogonal. In this note, we identify some crucial mistakes in their argument to the extent that the main claim is incorrect.
△ Less
Submitted 20 February, 2024;
originally announced February 2024.
-
Improvements on Device Independent and Semi-Device Independent Protocols of Randomness Expansion
Authors:
Rutvij Bhavsar
Abstract:
To generate genuine random numbers, random number generators based on quantum theory are essential. However, ensuring that the process used to produce randomness meets desired security standards can pose challenges for traditional quantum random number generators. This thesis delves into Device Independent (DI) and Semi-Device Independent (semi-DI) protocols of randomness expansion, based on a min…
▽ More
To generate genuine random numbers, random number generators based on quantum theory are essential. However, ensuring that the process used to produce randomness meets desired security standards can pose challenges for traditional quantum random number generators. This thesis delves into Device Independent (DI) and Semi-Device Independent (semi-DI) protocols of randomness expansion, based on a minimal set of experimentally verifiable security assumptions. The security in DI protocols relies on the violation of Bell inequalities, which certify the quantum behavior of devices. The semi-DI protocols discussed in this thesis require the characterization of only one device - a power meter. These protocols exploit the fact that quantum states can be prepared such that they cannot be distinguished with certainty, thereby creating a randomness resource. In this study, we introduce enhanced DI and semi-DI protocols that surpass existing ones in terms of output randomness rate, security, or in some instances, both. Our analysis employs the Entropy Accumulation Theorem (EAT) to determine the extractable randomness for finite rounds. A notable contribution is the introduction of randomness expansion protocols that recycle input randomness, significantly enhancing finite round randomness rates for DI protocols based on the CHSH inequality violation. In the final section of the thesis, we delve into Generalized Probability Theories (GPTs), with a focus on Boxworld, the largest GPT capable of producing correlations consistent with relativity. A tractable criterion for identifying a Boxworld channel is presented.
△ Less
Submitted 22 November, 2023;
originally announced November 2023.
-
Improved device-independent randomness expansion rates using two sided randomness
Authors:
Rutvij Bhavsar,
Sammy Ragy,
Roger Colbeck
Abstract:
A device-independent randomness expansion protocol aims to take an initial random string and generate a longer one, where the security of the protocol does not rely on knowing the inner workings of the devices used to run it. In order to do so, the protocol tests that the devices violate a Bell inequality and one then needs to bound the amount of extractable randomness in terms of the observed vio…
▽ More
A device-independent randomness expansion protocol aims to take an initial random string and generate a longer one, where the security of the protocol does not rely on knowing the inner workings of the devices used to run it. In order to do so, the protocol tests that the devices violate a Bell inequality and one then needs to bound the amount of extractable randomness in terms of the observed violation. The entropy accumulation theorem lower bounds the extractable randomness of a protocol with many rounds in terms of the single-round von Neumann entropy of any strategy achieving the observed score. Tight bounds on the von Neumann entropy are known for the one-sided randomness (i.e., where the randomness from only one party is used) when using the Clauser-Horne-Shimony-Holt (CHSH) game. Here we investigate the possible improvement that could be gained using the two-sided randomness. We generate upper bounds on this randomness by attempting to find the optimal eavesdrop** strategy, providing analytic formulae in two cases. We additionally compute lower bounds that outperform previous ones and can be made arbitrarily tight (at the expense of more computation time). These bounds get close to our upper bounds, and hence we conjecture that our upper bounds are tight. We also consider a modified protocol in which the input randomness is recycled. This modified protocol shows the possibility of rate gains of several orders of magnitude based on recent experimental parameters, making device-independent randomness expansion significantly more practical. It also enables the locality loophole to be closed while expanding randomness in a way that typical spot-checking protocols do not.
△ Less
Submitted 2 March, 2023; v1 submitted 12 March, 2021;
originally announced March 2021.
-
Machine Learning Modeling of Wigner Intracule Functionals for Two Electrons in One Dimension
Authors:
Rutvij Vihang Bhavsar,
Raghunathan Ramakrishnan
Abstract:
In principle, many-electron correlation energy can be precisely computed from a reduced Wigner distribution function ($\mathcal{W}$) thanks to a universal functional transformation ($\mathcal{F}$), whose formal existence is akin to that of the exchange-correlation functional in density functional theory. While the exact dependence of $\mathcal{F}$ on $\mathcal{W}$ is unknown, a few approximate par…
▽ More
In principle, many-electron correlation energy can be precisely computed from a reduced Wigner distribution function ($\mathcal{W}$) thanks to a universal functional transformation ($\mathcal{F}$), whose formal existence is akin to that of the exchange-correlation functional in density functional theory. While the exact dependence of $\mathcal{F}$ on $\mathcal{W}$ is unknown, a few approximate parametric models have been proposed in the past. Here, for a dataset of 923 one-dimensional external potentials with two interacting electrons, we apply machine learning to model $\mathcal{F}$ within the kernel Ansatz. We deal with over-fitting of the kernel to a specific region of phase-space by a one-step regularization not depending on any hyperparameters. Reference correlation energies have been computed by performing exact and Hartree--Fock calculations using discrete variable representation. The resulting models require $\mathcal{W}$ calculated at the Hartree--Fock level as input while yielding monotonous decay in the predicted correlation energies of new molecules reaching sub-chemical accuracy with training.
△ Less
Submitted 21 January, 2019; v1 submitted 2 February, 2018;
originally announced February 2018.