Finite-key analysis of decoy model semi-quantum key distribution based on four-state protocol

被引:0
作者
Zhan, Shao-Kang [1 ]
Wang, Jin-Dong [1 ]
Dong, Shuang [1 ]
Huang, Si-Ying [1 ]
Hou, Qing-Cheng [1 ]
Mo, Nai-Da [1 ]
Mi, Shang [1 ]
Xiang, Li-Bing [1 ,2 ]
Zhao, Tian-Ming [1 ,2 ]
Yu, Ya-Fei [1 ,2 ]
Wei, Zheng-Jun [1 ]
Zhang, Zhi-Ming [1 ,2 ]
机构
[1] South China Normal Univ, Sch Informat & Optoelect Sci & Engn, Guangdong Prov Key Lab Quantum Control Engn & Mat, Guangzhou 510006, Peoples R China
[2] South China Normal Univ, Sch Informat & Optoelect Sci & Engn, Guangdong Prov Key Lab Micronanophoton Funct Mat &, Guangzhou 510006, Peoples R China
基金
中国国家自然科学基金;
关键词
semi-quantum key distribution; decoy state; Hoeffding's inequality; finite-key; CRYPTOGRAPHY; SECURITY; SYSTEMS; PROOF;
D O I
10.7498/aps.72.20230849
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Semi-quantum key distribution allows a full quantum user Alice and a classical user Bob to share a pair of security keys guaranteed by physical principles. Semi-quantum key distribution is proposed while verifying its robustness. Subsequently, its unconditional security of semi-quantum key distribution system is verified theoretically. In 2021, the feasibility of semi-quantum key distribution system based on mirror protocol was verified experimentally. However, the feasibility experimental system still uses the laser pulse with strong attenuation. It has been proved in the literature that the semi-quantum key distribution system still encounters the risk of secret key leakage under photon number splitting attack. Therefore, the actual security of key distribution can be further reasonably evaluated by introducing the temptation state and conducting the finite-key analysis in the key distribution process. In this work, for the model of adding one-decoy state only to Alice at the sending based on a four state semi-quantum key distribution system, the length of the security key in the case of finite-key is analyzed by using Hoeffding inequality, and then the formula of the security key rate is obtained. It is found in the numerical simulation that when the sample size is 10(5), the security key rate of 10(-4), which is close to the security key rate of the asymptotic limits, can be obtained in the case of close range. It is very important for the practical application of semi-quantum key distribution system.
引用
收藏
页数:12
相关论文
共 54 条
[41]   Uncertainty Relation for Smooth Entropies [J].
Tomamichel, Marco ;
Renner, Renato .
PHYSICAL REVIEW LETTERS, 2011, 106 (11)
[42]   Chain Rules for Smooth Min- and Max-Entropies [J].
Vitanov, Alexander ;
Dupuis, Frederic ;
Tomamichel, Marco ;
Renner, Renato .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2013, 59 (05) :2603-2612
[43]   Experimental demonstration of polarization encoding quantum key distribution system based on intrinsically stable polarization-modulated units [J].
Wang, Jindong ;
Qin, Xiaojuan ;
Jiang, Yinzhu ;
Wang, Xiaojing ;
Chen, Liwei ;
Zhao, Feng ;
Wei, Zhengjun ;
Zhang, Zhiming .
OPTICS EXPRESS, 2016, 24 (08) :8302-8309
[44]   Practical decoy-state method in quantum key distribution with a heralded single-photon source [J].
Wang, Qin ;
Wang, Xiang-Bin ;
Guo, Guang-Can .
PHYSICAL REVIEW A, 2007, 75 (01)
[45]   Beating the photon-number-splitting attack in practical quantum cryptography [J].
Wang, XB .
PHYSICAL REVIEW LETTERS, 2005, 94 (23)
[46]   Scalable high-rate twin-field quantum key distribution networks without constraint of probability and intensity [J].
Xie, Yuan -Mei ;
Weng, Chen-Xun ;
Lu, Yu-Shuo ;
Fu, Yao ;
Wang, Yang ;
Yin, Hua-Lei ;
Chen, Zeng-Bing .
PHYSICAL REVIEW A, 2023, 107 (04)
[47]   Breaking the Rate-Loss Bound of Quantum Key Distribution with Asynchronous Two-Photon Interference [J].
Xie, Yuan-Mei ;
Lu, Yu-Shuo ;
Weng, Chen-Xun ;
Cao, Xiao-Yu ;
Jia, Zhao-Ying ;
Bao, Yu ;
Wang, Yang ;
Fu, Yao ;
Yin, Hua-Lei ;
Chen, Zeng-Bing .
PRX QUANTUM, 2022, 3 (02)
[48]   Experimental quantum secure network with digital signatures and encryption [J].
Yin, Hua-Lei ;
Fu, Yao ;
Li, Chen-Long ;
Weng, Chen-Xun ;
Li, Bing-Hong ;
Gu, Jie ;
Lu, Yu-Shuo ;
Huang, Shan ;
Chen, Zeng-Bing .
NATIONAL SCIENCE REVIEW, 2023, 10 (04)
[49]   Mode-pairing quantum key distribution [J].
Zeng, Pei ;
Zhou, Hongyi ;
Wu, Weijie ;
Ma, Xiongfeng .
NATURE COMMUNICATIONS, 2022, 13 (01)
[50]   Single-state semi-quantum key distribution protocol and its security proof [J].
Zhang, Wei ;
Qiu, Daowen ;
Mateus, Paulo .
INTERNATIONAL JOURNAL OF QUANTUM INFORMATION, 2020, 18 (04)