Devashish Tupkary

ORCID: 0000-0002-7586-3738
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Quantum Information and Cryptography
  • Quantum Computing Algorithms and Architecture
  • Quantum Mechanics and Applications
  • Advanced Thermodynamics and Statistical Mechanics
  • Spectroscopy and Quantum Chemical Studies
  • Photonic and Optical Devices
  • Interconnection Networks and Systems
  • Advancements in PLL and VCO Technologies
  • Cryptographic Implementations and Security
  • Quantum-Dot Cellular Automata
  • Quantum optics and atomic interactions
  • Distributed systems and fault tolerance
  • Quantum many-body systems
  • Security and Verification in Computing
  • Optical Network Technologies

University of Waterloo
2022-2024

International Centre for Theoretical Sciences
2022

Tata Institute of Fundamental Research
2022

Indian Institute of Science Bangalore
2022

It is very common in the literature to write a Markovian quantum master equation Lindblad form describe system with multiple degrees of freedom and weakly connected thermal baths which can, general, be at different temperatures chemical potentials. However, microscopically derived up leading order system-bath coupling so-called Redfield form, known not preserve complete positivity most cases. Additional approximations are required obtain form. We lay down some fundamental requirements for...

10.1103/physreva.105.032208 article EN Physical review. A/Physical review, A 2022-03-16

We investigate the possibility of a Markovian quantum master equation (QME) that consistently describes finite-dimensional system, part which is weakly coupled to thermal bath. To preserve complete positivity and trace, such QME must be Lindblad form. For physical consistency, it should additionally local conservation laws able show thermalization. search for equations satisfying these additional criteria. First, we microscopically derived Bloch-Redfield violates unless in extremely special...

10.1103/physreva.107.062216 article EN Physical review. A/Physical review, A 2023-06-28

We present a finite-size security proof for generic quantum key distribution protocols against independent and identically distributed collective attacks extend it to coherent using the postselection technique. This work introduces two significant improvements over previous results. First, we achieve tighter rates by employing refined concentration inequalities in acceptance testing phase. Second, improve second-order correction terms rate expression, reducing them scale with number of...

10.48550/arxiv.2502.05382 preprint EN arXiv (Cornell University) 2025-02-07

We discuss the status of security proofs for practical decoy-state Quantum Key Distribution using BB84 protocol, pertaining to optical implementations weak coherent pulses and threshold photo-detectors. Our focus is on gaps in existing literature. Gaps might result, example, from a mismatch protocol detail choices proof technique elements, relying earlier results that made different assumptions, or do not consider real-world requirements. While substantial progress has been made, our...

10.48550/arxiv.2502.10340 preprint EN arXiv (Cornell University) 2025-02-14

We present a security proof for variable-length QKD in the Renner framework against IID collective attacks. Our can be lifted to coherent attacks using postselection technique. first main result is theorem convert sequence of proofs fixed-length protocols satisfying certain conditions protocol. This conversion requires no new calculations, does not require any changes final key lengths or amount error-correction information, and at most doubles parameter. second description more general...

10.1103/physrevresearch.6.023002 article EN cc-by Physical Review Research 2024-04-01

The postselection technique is an important proof for proving the security of quantum key distribution protocols against coherent attacks. In this work, we go through multiple steps to rigorously apply optical protocols. First, place on a rigorous mathematical foundation by fixing technical flaw in original paper. Second, extend applicability prepare-and-measure using de Finetti reduction with fixed marginal. Third, show how can be used decoy-state tagging source. Finally, realistic setups...

10.48550/arxiv.2403.11851 preprint EN arXiv (Cornell University) 2024-03-18

We point out a critical flaw in the analysis of quantum key distribution protocols that employ two-way error-correction protocol Cascade. Specifically, this stems from an incomplete consideration all communication occurs during Cascade protocol. present straightforward and elegant alternative approach addresses produces valid rates. exemplify our new by comparing its rates with those generated using older, incorrect approaches, for qubit BB84 decoy-state protocols. show that, many...

10.1103/physrevapplied.20.064040 article EN cc-by Physical Review Applied 2023-12-22

The postselection technique is an important proof for proving the security of quantum key distribution protocols against coherent attacks via uplift any independent identically distributed collective attacks. In this work, we go through multiple steps to rigorously apply optical protocols. First, place on a rigorous mathematical foundation by fixing technical flaw in original paper. Second, extend applicability prepare-and-measure using de Finetti reduction with fixed marginal. Third, show...

10.1103/prxquantum.5.040315 article EN cc-by PRX Quantum 2024-10-29

We present a finite-size security proof of the BB84 QKD protocol against coherent attacks, using entropic uncertainty relations, in presence imperfectly characterized basis-efficiency mismatch. Our requires no new modifications to steps or hardware, and works by obtaining suitable bound on phase error rate. It is applicable detectors, only maximum relative difference detection efficiencies dark count rates detectors be characterized. Moreover, our allows Eve use any spatio-temporal degree...

10.48550/arxiv.2408.17349 preprint EN arXiv (Cornell University) 2024-08-30

We investigate the possibility of a Markovian quantum master equation (QME) that consistently describes finite-dimensional system, part which is weakly coupled to thermal bath. In order preserve complete positivity and trace, such QME must be Lindblad form. For physical consistency, it should additionally local conservation laws able show thermalization. First, we microscopically derived Redfield (RE) violates unless in extremely special cases. then prove imposing demanding preservation...

10.48550/arxiv.2301.02146 preprint EN cc-by arXiv (Cornell University) 2023-01-01

We point out a critical flaw in the analysis of Quantum Key Distribution (QKD) protocols that employ two-way error correction protocol Cascade. Specifically, this stems from an incom-plete consideration all communication occurs during Cascade protocol. present straightforward and elegant alternative approach addresses produces valid key rates. exemplify our new by comparing its rates with those generated using older, incorrect approaches, for Qubit BB84 Decoy-State protocols. show many...

10.48550/arxiv.2307.00576 preprint EN cc-by-nc-sa arXiv (Cornell University) 2023-01-01

We present a security proof for variable-length QKD in the Renner framework against IID collective attacks. Our can be lifted to coherent attacks using postselection technique. first main result is theorem convert series of proofs fixed-length protocols satisfying certain conditions protocol. This conversion requires no new calculations, does not require any changes final key lengths or amount error-correction information, and at most doubles parameter. second description more general class...

10.48550/arxiv.2311.01600 preprint EN cc-by-nc-sa arXiv (Cornell University) 2023-01-01
Coming Soon ...