Finite-key analysis of decoy model semi-quantum key distribution based on four-state protocol

被引:0
作者
Zhan, Shao-Kang [1 ]
Wang, Jin-Dong [1 ]
Dong, Shuang [1 ]
Huang, Si-Ying [1 ]
Hou, Qing-Cheng [1 ]
Mo, Nai-Da [1 ]
Mi, Shang [1 ]
Xiang, Li-Bing [1 ,2 ]
Zhao, Tian-Ming [1 ,2 ]
Yu, Ya-Fei [1 ,2 ]
Wei, Zheng-Jun [1 ]
Zhang, Zhi-Ming [1 ,2 ]
机构
[1] South China Normal Univ, Sch Informat & Optoelect Sci & Engn, Guangdong Prov Key Lab Quantum Control Engn & Mat, Guangzhou 510006, Peoples R China
[2] South China Normal Univ, Sch Informat & Optoelect Sci & Engn, Guangdong Prov Key Lab Micronanophoton Funct Mat &, Guangzhou 510006, Peoples R China
基金
中国国家自然科学基金;
关键词
semi-quantum key distribution; decoy state; Hoeffding's inequality; finite-key; CRYPTOGRAPHY; SECURITY; SYSTEMS; PROOF;
D O I
10.7498/aps.72.20230849
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Semi-quantum key distribution allows a full quantum user Alice and a classical user Bob to share a pair of security keys guaranteed by physical principles. Semi-quantum key distribution is proposed while verifying its robustness. Subsequently, its unconditional security of semi-quantum key distribution system is verified theoretically. In 2021, the feasibility of semi-quantum key distribution system based on mirror protocol was verified experimentally. However, the feasibility experimental system still uses the laser pulse with strong attenuation. It has been proved in the literature that the semi-quantum key distribution system still encounters the risk of secret key leakage under photon number splitting attack. Therefore, the actual security of key distribution can be further reasonably evaluated by introducing the temptation state and conducting the finite-key analysis in the key distribution process. In this work, for the model of adding one-decoy state only to Alice at the sending based on a four state semi-quantum key distribution system, the length of the security key in the case of finite-key is analyzed by using Hoeffding inequality, and then the formula of the security key rate is obtained. It is found in the numerical simulation that when the sample size is 10(5), the security key rate of 10(-4), which is close to the security key rate of the asymptotic limits, can be obtained in the case of close range. It is very important for the practical application of semi-quantum key distribution system.
引用
收藏
页数:12
相关论文
共 54 条
[1]   Semiquantum key distribution with high quantum noise tolerance [J].
Amer, Omar ;
Krawec, Walter O. .
PHYSICAL REVIEW A, 2019, 100 (02)
[2]   QUANTUM CRYPTOGRAPHY USING ANY 2 NONORTHOGONAL STATES [J].
BENNETT, CH .
PHYSICAL REVIEW LETTERS, 1992, 68 (21) :3121-3124
[3]   Quantum cryptography: Public key distribution and coin tossing [J].
Bennett, Charles H. ;
Brassard, Gilles .
THEORETICAL COMPUTER SCIENCE, 2014, 560 :7-11
[4]   Attacks against a Simplified Experimentally Feasible Semiquantum Key Distribution Protocol [J].
Boyer, Michel ;
Liss, Rotem ;
Mor, Tal .
ENTROPY, 2018, 20 (07)
[5]   Experimentally feasible protocol for semiquantum key distribution [J].
Boyer, Michel ;
Katz, Matty ;
Liss, Rotem ;
Mor, Tal .
PHYSICAL REVIEW A, 2017, 96 (06)
[6]   Quantum key distribution with classical Bob [J].
Boyer, Michel ;
Kenigsberg, Dan ;
Mor, Tal .
PHYSICAL REVIEW LETTERS, 2007, 99 (14)
[7]  
Carlos N M, 2021, Quantum Inf. Process., V20, P196
[8]   Faking photon number on a transition-edge sensor [J].
Chaiwongkhot, Poompong ;
Zhong, Jiaqiang ;
Huang, Anqi ;
Qin, Hao ;
Shi, Sheng-cai ;
Makarov, Vadim .
EPJ QUANTUM TECHNOLOGY, 2022, 9 (01)
[9]   Experimental measurement-device-independent quantum key distribution with the double-scanning method [J].
Chen, Yi-Peng ;
Liu, Jing-Yang ;
Sun, Ming-Shuo ;
Zhou, Xing-Xu ;
Zhang, Chun-Hui ;
Li, Jian ;
Wang, Qin .
OPTICS LETTERS, 2021, 46 (15) :3729-3732
[10]   Twin-Field Quantum Key Distribution without Phase Postselection [J].
Cui, Chaohan ;
Yin, Zhen-Qiang ;
Wang, Rong ;
Chen, Wei ;
Wang, Shuang ;
Guo, Guang-Can ;
Han, Zheng-Fu .
PHYSICAL REVIEW APPLIED, 2019, 11 (03)