Implementation of Machine Learning in Quantum Key Distributions

被引:20
作者
Ren, Zi-Ang [1 ]
Chen, Yi-Peng [1 ]
Liu, Jing-Yang [1 ]
Ding, Hua-Jian [1 ]
Wang, Qin [1 ]
机构
[1] Nanjing Univ Posts & Telecommun, Broadband Wireless Commun & Sensor Network Techno, Telecommun & Networks Natl Engn Res Ctr, Minist Educ,Inst Quantum Informat & Technol, Nanjing 210003, Peoples R China
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
Protocols; Training; Machine learning; Machine learning algorithms; Radio frequency; Security; Random forests; Quantum key distribution; machine learning; random forest; protocol selecting;
D O I
10.1109/LCOMM.2020.3040212
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
In the future massive applications of quantum communication network, it is crucial to realize real-time selection of the optimal quantum key distributions (QKD) protocol for the improvement of system security and optimizing resources configuration. In principle, this can be done by utilizing algorithms such as exhaustive traversal or local search algorithm, whose time cost, however, is unbearable. Here we for the first time propose to employ machine learning methods into the selecting of optimal QKD protocol and apply random forest (RF) as an example for illustration. With the help of the easy-to-train classifier of RF, we can achieve a highly efficient optimal QKD protocols selector. Besides, we also do comparisons among RF and other machine learning methods, e.g., supporting vector machine, K-nearest neighbors algorithm, multinomial naive bayes classifier, and convolutional neural networks. Results demonstrate that, besides its advantage in efficiency, the RF classifier also excels both in preciseness and robustness with an accuracy over 98% for the testing set and an enjoyable receiver operating characteristic.
引用
收藏
页码:940 / 944
页数:5
相关论文
共 36 条
[1]   AN INTRODUCTION TO KERNEL AND NEAREST-NEIGHBOR NONPARAMETRIC REGRESSION [J].
ALTMAN, NS .
AMERICAN STATISTICIAN, 1992, 46 (03) :175-185
[2]   Shape quantization and recognition with randomized trees [J].
Amit, Y ;
Geman, D .
NEURAL COMPUTATION, 1997, 9 (07) :1545-1588
[3]  
Batista GE., 2004, ACM SIGKDD EXPL NEWS, V6, P20, DOI [DOI 10.1145/1007730.1007735, 10.1145/1007730.1007735]
[4]   Quantum cryptography: Public key distribution and coin tossing [J].
Bennett, Charles H. ;
Brassard, Gilles .
THEORETICAL COMPUTER SCIENCE, 2014, 560 :7-11
[5]   The use of the area under the roc curve in the evaluation of machine learning algorithms [J].
Bradley, AP .
PATTERN RECOGNITION, 1997, 30 (07) :1145-1159
[6]   SMOTE: Synthetic minority over-sampling technique [J].
Chawla, Nitesh V. ;
Bowyer, Kevin W. ;
Hall, Lawrence O. ;
Kegelmeyer, W. Philip .
2002, American Association for Artificial Intelligence (16)
[7]   Sending-or-Not-Sending with Independent Lasers: Secure Twin-Field Quantum Key Distribution over 509 km [J].
Chen, Jiu-Peng ;
Zhang, Chi ;
Liu, Yang ;
Jiang, Cong ;
Zhang, Weijun ;
Hu, Xiao-Long ;
Guan, Jian-Yu ;
Yu, Zong-Wen ;
Xu, Hai ;
Lin, Jin ;
Li, Ming-Jun ;
Chen, Hao ;
Li, Hao ;
You, Lixing ;
Wang, Zhen ;
Wang, Xiang-Bin ;
Zhang, Qiang ;
Pan, Jian-Wei .
PHYSICAL REVIEW LETTERS, 2020, 124 (07)
[8]   On the learnability and design of output codes for multiclass problems [J].
Crammer, K ;
Singer, Y .
MACHINE LEARNING, 2002, 47 (2-3) :201-233
[9]   280-km experimental demonstration of a quantum digital signature with one decoy state [J].
Ding, Hua-Jian ;
Chen, Jing-Jing ;
Ji, Liang ;
Zhou, Xing-Yu ;
Zhang, Chun-Hui ;
Zhang, Chun-Mei ;
Wang, Qin .
OPTICS LETTERS, 2020, 45 (07) :1711-1714
[10]   Predicting optimal parameters with random forest for quantum key distribution [J].
Ding, Hua-Jian ;
Liu, Jing-Yang ;
Zhang, Chun-Mei ;
Wang, Qin .
QUANTUM INFORMATION PROCESSING, 2020, 19 (02)