Security Bounds for Efficient Decoy-State Quantum Key Distribution

被引:16
|
作者
Lucamarini, Marco [1 ,2 ]
Dynes, James F. [1 ,2 ]
Froehlich, Bernd [1 ]
Yuan, Zhiliang [1 ,2 ]
Shields, Andrew J. [1 ,2 ]
机构
[1] Toshiba Res Europe Ltd, Cambridge CB40GZ, England
[2] Toshiba Corp Res & Dev Ctr, Kawasaki, Kanagawa 2128582, Japan
关键词
Quantum communications; quantum key distribution; finite-size effects; BB84; protocol; collective attacks; sampling theory; confidence interval; independent identically distributed random variables; PROBABILITY-INEQUALITIES; UNCONDITIONAL SECURITY; PROOF;
D O I
10.1109/JSTQE.2015.2394774
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Information-theoretical security of quantum key distribution (QKD) has been convincingly proven in recent years and remarkable experiments have shown the potential of QKD for real-world applications. Due to its unique capability of combining high key rate and security in a realistic finite-size scenario, the efficient version of the BB84 QKD protocol endowed with decoy states has been subject of intensive research. Its recent experimental implementation finally demonstrated a secure key rate beyond 1 Mb/s over a 50 km of optical fiber. However, the achieved rate holds under the restrictive assumption that the eavesdropper performs collective attacks. Here, we review the protocol and generalize its security. We exploit a map by Ahrens to rigorously upper bound the hypergeometric distribution resulting from a general eavesdropping. Despite the extended applicability of the new protocol, its key rate is only marginally smaller than its predecessor in all cases of practical interest.
引用
收藏
页码:1 / 8
页数:8
相关论文
共 50 条
  • [1] Tight security bounds for decoy-state quantum key distribution
    Hua-Lei Yin
    Min-Gang Zhou
    Jie Gu
    Yuan-Mei Xie
    Yu-Shuo Lu
    Zeng-Bing Chen
    Scientific Reports, 10
  • [2] Tight security bounds for decoy-state quantum key distribution
    Yin, Hua-Lei
    Zhou, Min-Gang
    Gu, Jie
    Xie, Yuan-Mei
    Lu, Yu-Shuo
    Chen, Zeng-Bing
    SCIENTIFIC REPORTS, 2020, 10 (01)
  • [3] Efficient decoy-state quantum key distribution with quantified security
    Lucamarini, M.
    Patel, K. A.
    Dynes, J. F.
    Froehlich, B.
    Sharpe, A. W.
    Dixon, A. R.
    Yuan, Z. L.
    Penty, R. V.
    Shields, A. J.
    OPTICS EXPRESS, 2013, 21 (21): : 24550 - 24565
  • [4] Concise security bounds for practical decoy-state quantum key distribution
    Lim, Charles Ci Wen
    Curty, Marcos
    Walenta, Nino
    Xu, Feihu
    Zbinden, Hugo
    PHYSICAL REVIEW A, 2014, 89 (02):
  • [5] Security bounds for decoy-state quantum key distribution with arbitrary photon-number statistics
    Foletto, Giulio
    Picciariello, Francesco
    Agnesi, Costantino
    Villoresi, Paolo
    Vallone, Giuseppe
    PHYSICAL REVIEW A, 2022, 105 (01)
  • [6] Upper bounds for the secure key rate of the decoy-state quantum key distribution
    Curty, Marcos
    Moroder, Tobias
    Ma, Xiongfeng
    Lo, Hoi-Kwong
    Luetkenhaus, Norbert
    PHYSICAL REVIEW A, 2009, 79 (03):
  • [7] Security of Decoy-State Quantum Key Distribution with Correlated Intensity Fluctuations
    Sixto, Xoel
    Zapatero, Victor
    Curty, Marcos
    PHYSICAL REVIEW APPLIED, 2022, 18 (04)
  • [8] Improved security bounds against the Trojan-horse attack in decoy-state quantum key distribution
    Zijian Li
    Bingbing Zheng
    Chengxian Zhang
    Zhenrong Zhang
    Hong-Bo Xie
    Kejin Wei
    Quantum Information Processing, 23
  • [9] Improved security bounds against the Trojan-horse attack in decoy-state quantum key distribution
    Li, Zijian
    Zheng, Bingbing
    Zhang, Chengxian
    Zhang, Zhenrong
    Xie, Hong-Bo
    Wei, Kejin
    QUANTUM INFORMATION PROCESSING, 2024, 23 (02)
  • [10] Nonorthogonal decoy-state quantum key distribution
    Li, JB
    Fang, XM
    CHINESE PHYSICS LETTERS, 2006, 23 (04) : 775 - 778