Experimental quantum key distribution with finite-key security analysis for noisy channels

被引:39
作者
Bacco, Davide [1 ]
Canale, Matteo [1 ]
Laurenti, Nicola [1 ]
Vallone, Giuseppe [1 ]
Villoresi, Paolo [1 ]
机构
[1] Univ Padua, Dept Informat Engn, I-35131 Padua, Italy
来源
NATURE COMMUNICATIONS | 2013年 / 4卷
关键词
CRYPTOGRAPHY; STATES;
D O I
10.1038/ncomms3363
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
In quantum key distribution implementations, each session is typically chosen long enough so that the secret key rate approaches its asymptotic limit. However, this choice may be constrained by the physical scenario, as in the perspective use with satellites, where the passage of one terminal over the other is restricted to a few minutes. Here we demonstrate experimentally the extraction of secure keys leveraging an optimal design of the prepare-and-measure scheme, according to recent finite-key theoretical tight bounds. The experiment is performed in different channel conditions, and assuming two distinct attack models: individual attacks or general quantum attacks. The request on the number of exchanged qubits is then obtained as a function of the key size and of the ambient quantum bit error rate. The results indicate that viable conditions for effective symmetric, and even one-time-pad, cryptography are achievable.
引用
收藏
页数:8
相关论文
共 33 条
  • [1] Quantum key distribution with finite resources: Secret key rates via Renyi entropies
    Abruzzo, Silvestre
    Kampermann, Hermann
    Mertz, Markus
    Bruss, Dagmar
    [J]. PHYSICAL REVIEW A, 2011, 84 (03):
  • [2] [Anonymous], 2010, JAPANESE QUANTUM INF
  • [3] [Anonymous], 2006, Elements of Information Theory
  • [4] [Anonymous], J AM I ELEC ENG
  • [5] [Anonymous], 2004, US ROADMAP FREE SPAC
  • [6] [Anonymous], GRAPHS MATH TABLES
  • [7] Long-distance quantum communication with entangled photons using satellites
    Aspelmeyer, M
    Jennewein, T
    Pfennigbauer, M
    Leeb, WR
    Zeilinger, A
    [J]. IEEE JOURNAL OF SELECTED TOPICS IN QUANTUM ELECTRONICS, 2003, 9 (06) : 1541 - 1551
  • [8] Bennett C. H., 2014, Theoretical computer science, P175, DOI [DOI 10.1016/J.TCS.2014.05.025, 10.1016/j.tcs.2014.05.025]
  • [9] Generalized privacy amplification
    Bennett, CH
    Brassard, G
    Crepeau, C
    Maurer, UM
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1995, 41 (06) : 1915 - 1923
  • [10] QUANTUM CRYPTOGRAPHY USING ANY 2 NONORTHOGONAL STATES
    BENNETT, CH
    [J]. PHYSICAL REVIEW LETTERS, 1992, 68 (21) : 3121 - 3124