2021
DOI: 10.48550/arxiv.2104.03847
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Robust Interior Point Method for Quantum Key Distribution Rate Computation

Abstract: Security proof methods for quantum key distribution, QKD, that are based on the numerical key rate calculation problem, are powerful in principle. However, the practicality of the methods are limited by computational resources and the efficiency and accuracy of the underlying algorithms for convex optimization. We derive a stable reformulation of the convex nonlinear semidefinite programming, SDP, model for the key rate calculation problems. We use this to develop an efficient, accurate algorithm. The reformul… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
8
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(8 citation statements)
references
References 34 publications
0
8
0
Order By: Relevance
“…One is the quadrature phase-shift-keying (QPSK) heterodyne detection protocol [37], and the other is an improved QPSK homodyne detection protocol [43]. To collect a dataset for training neural networks, we generate secure key rates of both protocols by applying the same numerical method [37,40]. In the following, we briefly introduce how computing key rates can be transformed into a relevant convex objective function for numerical optimization.…”
Section: Numerical Methods For CV Qkd With Discrete Modulationmentioning
confidence: 99%
See 1 more Smart Citation
“…One is the quadrature phase-shift-keying (QPSK) heterodyne detection protocol [37], and the other is an improved QPSK homodyne detection protocol [43]. To collect a dataset for training neural networks, we generate secure key rates of both protocols by applying the same numerical method [37,40]. In the following, we briefly introduce how computing key rates can be transformed into a relevant convex objective function for numerical optimization.…”
Section: Numerical Methods For CV Qkd With Discrete Modulationmentioning
confidence: 99%
“…This neural network model learns the mapping between input parameters and key rates from datasets generated by numerical methods, which supports the computation of secure key rates in real time [39]. However, the mapping complexity between input parameters and key rates depends on the solving complexity of discrete-modulated protocols' key rates through numerical approaches [40]. Selecting architectures and hyperparameters plays a critical role in the performance of a neural network.…”
Section: Introductionmentioning
confidence: 99%
“…Since the security deals with the discontinuity of modulation, the loophole of continuity is leaped over naturally. Brilliant numerical methods for security analysis are constantly emerging [38][39][40] and analysis methods follow up [41], even though the discrete modulation lacks U(n) symmetry. Finally, security against collective attacks in the asymptotic regime has been proved.…”
Section: Introductionmentioning
confidence: 99%
“…In CV-QKD, discrete modulation technology has attracted much attention [26,[34][35][36][37][38][39][40][41][42][43][44] because of its ability to reduce the requirements for modulation devices. However, due to the lack of symmetry, the security proof of discrete modulation CV-QKD also mainly relies on numerical methods [37][38][39][40][41][42]45].Unfortunately, calculating a secure key rate by numerical methods requires minimizing a convex function over all eavesdropping attacks related with the experimental data [46,47]. The efficiency of this optimization depends on the number of parameters of the QKD protocol.…”
mentioning
confidence: 99%
“…For example, in discrete modulation CV-QKD, the number of parameters is generally 1000 − 3000 depending on the different choices of cutoff photon numbers [38]. This leads to the corresponding optimization possibly taking minutes or even hours [45]. Therefore, it is especially important to develop tools for calculating the key rate that are more efficient than numerical methods.In this work, we take the homodyne detection discrete-modulated CV-QKD [38] as an example to construct a neural network capable of predicting the secure key rate for the purpose of saving time and resource consumption.…”
mentioning
confidence: 99%