Security of the traditional quantum key distribution protocols with finite-key lengths

被引:1
作者
Feng, Bao [1 ,2 ]
Huang, Hai-Dong [3 ]
Bian, Yu-Xiang [1 ,2 ]
Jia, Wei [1 ,2 ]
Zhou, Xing-Yu [4 ]
Wang, Qin [4 ]
机构
[1] State Grid Elect Power Res Inst, Nanjing 211000, Peoples R China
[2] NRGD Quantum CTEK Co Ltd, Nanjing 211000, Peoples R China
[3] State Grid Jiangsu Elect Power Co Ltd, Nanjing 210000, Peoples R China
[4] Nanjing Univ Posts & Telecommun, Inst Quantum Informat & Technol, Nanjing 210003, Peoples R China
关键词
quantum key distribution; BB84; measurement-device-independent quantum key distribution; twin-field quantum key distribution;
D O I
10.1088/1674-1056/ac9b33
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Quantum key distribution (QKD) in principle can provide unconditional secure communication between distant parts. However, when finite-key length is taken into account, the security can only be ensured within certain security level. In this paper, we adopt the Chernoff bound analysis method to deal with finite-key-size effects, carrying out corresponding investigations on the relationship between the key generation rate and security parameters for different protocols, including BB84, measurement-device-independent and twin-field QKD protocols. Simulation results show that there exists a fundamental limit between the key rate and the security parameters. Therefore, this study can provide valuable references for practical application of QKD, getting a nice balance between the key generation rate and the security level.
引用
收藏
页数:5
相关论文
共 25 条
[1]  
Bennett C H., 1984, Theor. Comput. Sci, V560, P175, DOI [10.1016/j.tcs.2014.05.025, DOI 10.1016/J.TCS.2014.05.025, 10.1016/j.tcs.2011.08.039, DOI 10.1016/J.TCS.2011.08.039]
[2]   Side-Channel-Free Quantum Key Distribution [J].
Braunstein, Samuel L. ;
Pirandola, Stefano .
PHYSICAL REVIEW LETTERS, 2012, 108 (13)
[3]   Finite-key analysis for measurement-device-independent quantum key distribution [J].
Curty, Marcos ;
Xu, Feihu ;
Cui, Wei ;
Lim, Charles Ci Wen ;
Tamaki, Kiyoshi ;
Lo, Hoi-Kwong .
NATURE COMMUNICATIONS, 2014, 5
[4]   Practical issues in quantum-key-distribution postprocessing [J].
Fung, Chi-Hang Fred ;
Ma, Xiongfeng ;
Chau, H. F. .
PHYSICAL REVIEW A, 2010, 81 (01)
[5]   Quantum key distribution with high loss: Toward global secure communication [J].
Hwang, WY .
PHYSICAL REVIEW LETTERS, 2003, 91 (05) :579011-579014
[6]   Statistical-fluctuation analysis for quantum key distribution with consideration of after-pulse contributions [J].
Li, Hongxin ;
Jiang, Haodong ;
Gao, Ming ;
Ma, Zhi ;
Ma, Chuangui ;
Wang, Wei .
PHYSICAL REVIEW A, 2015, 92 (06)
[7]   Concise security bounds for practical decoy-state quantum key distribution [J].
Lim, Charles Ci Wen ;
Curty, Marcos ;
Walenta, Nino ;
Xu, Feihu ;
Zbinden, Hugo .
PHYSICAL REVIEW A, 2014, 89 (02)
[8]   Decoy state quantum key distribution [J].
Lo, HK ;
Ma, XF ;
Chen, K .
PHYSICAL REVIEW LETTERS, 2005, 94 (23)
[9]   Unconditional security of quantum key distribution over arbitrarily long distances [J].
Lo, HK ;
Chau, HF .
SCIENCE, 1999, 283 (5410) :2050-2056
[10]   Measurement-Device-Independent Quantum Key Distribution [J].
Lo, Hoi-Kwong ;
Curty, Marcos ;
Qi, Bing .
PHYSICAL REVIEW LETTERS, 2012, 108 (13)