Security Bounds for Efficient Decoy-State Quantum Key Distribution

被引:16
|
作者
Lucamarini, Marco [1 ,2 ]
Dynes, James F. [1 ,2 ]
Froehlich, Bernd [1 ]
Yuan, Zhiliang [1 ,2 ]
Shields, Andrew J. [1 ,2 ]
机构
[1] Toshiba Res Europe Ltd, Cambridge CB40GZ, England
[2] Toshiba Corp Res & Dev Ctr, Kawasaki, Kanagawa 2128582, Japan
关键词
Quantum communications; quantum key distribution; finite-size effects; BB84; protocol; collective attacks; sampling theory; confidence interval; independent identically distributed random variables; PROBABILITY-INEQUALITIES; UNCONDITIONAL SECURITY; PROOF;
D O I
10.1109/JSTQE.2015.2394774
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Information-theoretical security of quantum key distribution (QKD) has been convincingly proven in recent years and remarkable experiments have shown the potential of QKD for real-world applications. Due to its unique capability of combining high key rate and security in a realistic finite-size scenario, the efficient version of the BB84 QKD protocol endowed with decoy states has been subject of intensive research. Its recent experimental implementation finally demonstrated a secure key rate beyond 1 Mb/s over a 50 km of optical fiber. However, the achieved rate holds under the restrictive assumption that the eavesdropper performs collective attacks. Here, we review the protocol and generalize its security. We exploit a map by Ahrens to rigorously upper bound the hypergeometric distribution resulting from a general eavesdropping. Despite the extended applicability of the new protocol, its key rate is only marginally smaller than its predecessor in all cases of practical interest.
引用
收藏
页码:1 / 8
页数:8
相关论文
共 50 条
  • [1] Tight security bounds for decoy-state quantum key distribution
    Yin, Hua-Lei
    Zhou, Min-Gang
    Gu, Jie
    Xie, Yuan-Mei
    Lu, Yu-Shuo
    Chen, Zeng-Bing
    SCIENTIFIC REPORTS, 2020, 10 (01)
  • [2] Efficient decoy-state quantum key distribution with quantified security
    Lucamarini, M.
    Patel, K. A.
    Dynes, J. F.
    Froehlich, B.
    Sharpe, A. W.
    Dixon, A. R.
    Yuan, Z. L.
    Penty, R. V.
    Shields, A. J.
    OPTICS EXPRESS, 2013, 21 (21): : 24550 - 24565
  • [3] Upper bounds for the secure key rate of the decoy-state quantum key distribution
    Curty, Marcos
    Moroder, Tobias
    Ma, Xiongfeng
    Lo, Hoi-Kwong
    Luetkenhaus, Norbert
    PHYSICAL REVIEW A, 2009, 79 (03):
  • [4] Improved security bounds against the Trojan-horse attack in decoy-state quantum key distribution
    Zijian Li
    Bingbing Zheng
    Chengxian Zhang
    Zhenrong Zhang
    Hong-Bo Xie
    Kejin Wei
    Quantum Information Processing, 23
  • [5] Experimental passive decoy-state quantum key distribution
    Sun, Qi-Chao
    Wang, Wei-Long
    Liu, Yang
    Zhou, Fei
    Pelc, Jason S.
    Fejer, M. M.
    Peng, Cheng-Zhi
    Chen, Xianfeng
    Ma, Xiongfeng
    Zhang, Qiang
    Pan, Jian-Wei
    LASER PHYSICS LETTERS, 2014, 11 (08)
  • [6] Improved security bounds against the Trojan-horse attack in decoy-state quantum key distribution
    Li, Zijian
    Zheng, Bingbing
    Zhang, Chengxian
    Zhang, Zhenrong
    Xie, Hong-Bo
    Wei, Kejin
    QUANTUM INFORMATION PROCESSING, 2024, 23 (02)
  • [7] Improved key-rate bounds for practical decoy-state quantum-key-distribution systems
    Zhang, Zhen
    Zhao, Qi
    Razavi, Mohsen
    Ma, Xiongfeng
    PHYSICAL REVIEW A, 2017, 95 (01)
  • [8] Decoy-state quantum key distribution with biased basis choice
    Wei, Zhengchao
    Wang, Weilong
    Zhang, Zhen
    Gao, Ming
    Ma, Zhi
    Ma, Xiongfeng
    SCIENTIFIC REPORTS, 2013, 3
  • [9] Decoy-state quantum key distribution with a leaky source
    Tamaki, Kiyoshi
    Curty, Marcos
    Lucamarini, Marco
    NEW JOURNAL OF PHYSICS, 2016, 18
  • [10] Practical covert quantum key distribution with decoy-state method
    Fen-Zhuo Guo
    Li Liu
    An-Kang Wang
    Qiao-Yan Wen
    Quantum Information Processing, 2019, 18