CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◌ Quantum Computing Mar 23, 2026

Full Network Nonlocality Based Security In Quantum Key Distribution

arXiv Quantum Archived Mar 23, 2026 ✓ Full text saved

arXiv:2603.20035v1 Announce Type: new Abstract: In the last decade research of quantum nonlocality has moved beyond the regime of standard Bell nonlocality to consider network-based experimental set-ups involving multiple independent sources. Notion of full network nonlocality has emerged as some truly network phenomena that cannot be realized in traditional Bell experiments. Present work manifests utility of such form of truly network non-classicality in designing a four partite network-based e

Full text archived locally
✦ AI Summary · Claude Sonnet


    Quantum Physics [Submitted on 20 Mar 2026] Full Network Nonlocality Based Security In Quantum Key Distribution Kaushiki Mukherjee In the last decade research of quantum nonlocality has moved beyond the regime of standard Bell nonlocality to consider network-based experimental set-ups involving multiple independent sources. Notion of full network nonlocality has emerged as some truly network phenomena that cannot be realized in traditional Bell experiments. Present work manifests utility of such form of truly network non-classicality in designing a four partite network-based entanglement assisted quantum key distribution protocol. To be more precise, security of the protocol relies upon full network nonlocality detection via violation of some suitable trilocal inequality. Based on the quantum bit error rate and violation of trilocal inequality, arbitrary two qubit entangled states are characterized in accordance with their utility in successfully executing the protocol. Intuitively, owing to connected structure of entangled sources, any genuine form of network nonlocality may offer advantage over standard Bell nonlocality for designing secure key distribution protocols. To establish that as a fact, another QKD protocol relying upon Bell-CHSH nonlocality detection in all pairs of sender and a receiver party is designed. The former turns out to be more secure compared to the latter. Importantly, while the quantum bit error rate can be less than 14.6% exploiting Bell-CHSH nonlocality, it can be reduced below 13.7% by exploiting full network nonlocality. Comments: Preliminary version Subjects: Quantum Physics (quant-ph) Cite as: arXiv:2603.20035 [quant-ph]   (or arXiv:2603.20035v1 [quant-ph] for this version)   https://doi.org/10.48550/arXiv.2603.20035 Focus to learn more Submission history From: Kaushiki Mukherjee [view email] [v1] Fri, 20 Mar 2026 15:21:00 UTC (1,159 KB) Access Paper: view license Current browse context: quant-ph < prev   |   next > new | recent | 2026-03 References & Citations INSPIRE HEP NASA ADS Google Scholar Semantic Scholar Export BibTeX Citation Bookmark Bibliographic Tools Bibliographic and Citation Tools Bibliographic Explorer Toggle Bibliographic Explorer (What is the Explorer?) Connected Papers Toggle Connected Papers (What is Connected Papers?) Litmaps Toggle Litmaps (What is Litmaps?) scite.ai Toggle scite Smart Citations (What are Smart Citations?) Code, Data, Media Demos Related Papers About arXivLabs Which authors of this paper are endorsers? | Disable MathJax (What is MathJax?)
    💬 Team Notes
    Article Info
    Source
    arXiv Quantum
    Category
    ◌ Quantum Computing
    Published
    Mar 23, 2026
    Archived
    Mar 23, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗