Security Bounds for Efficient Decoy-State Quantum Key Distribution

被引:16
|
作者
Lucamarini, Marco [1 ,2 ]
Dynes, James F. [1 ,2 ]
Froehlich, Bernd [1 ]
Yuan, Zhiliang [1 ,2 ]
Shields, Andrew J. [1 ,2 ]
机构
[1] Toshiba Res Europe Ltd, Cambridge CB40GZ, England
[2] Toshiba Corp Res & Dev Ctr, Kawasaki, Kanagawa 2128582, Japan
关键词
Quantum communications; quantum key distribution; finite-size effects; BB84; protocol; collective attacks; sampling theory; confidence interval; independent identically distributed random variables; PROBABILITY-INEQUALITIES; UNCONDITIONAL SECURITY; PROOF;
D O I
10.1109/JSTQE.2015.2394774
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Information-theoretical security of quantum key distribution (QKD) has been convincingly proven in recent years and remarkable experiments have shown the potential of QKD for real-world applications. Due to its unique capability of combining high key rate and security in a realistic finite-size scenario, the efficient version of the BB84 QKD protocol endowed with decoy states has been subject of intensive research. Its recent experimental implementation finally demonstrated a secure key rate beyond 1 Mb/s over a 50 km of optical fiber. However, the achieved rate holds under the restrictive assumption that the eavesdropper performs collective attacks. Here, we review the protocol and generalize its security. We exploit a map by Ahrens to rigorously upper bound the hypergeometric distribution resulting from a general eavesdropping. Despite the extended applicability of the new protocol, its key rate is only marginally smaller than its predecessor in all cases of practical interest.
引用
收藏
页码:1 / 8
页数:8
相关论文
共 50 条
  • [21] Passive Decoy-State Quantum Key Distribution with Coherent Light
    Curty, Marcos
    Jofre, Marc
    Pruneri, Valerio
    Mitchell, Morgan W.
    ENTROPY, 2015, 17 (06) : 4064 - 4082
  • [22] Decoy-state quantum key distribution with biased basis choice
    Wei, Zhengchao
    Wang, Weilong
    Zhang, Zhen
    Gao, Ming
    Ma, Zhi
    Ma, Xiongfeng
    SCIENTIFIC REPORTS, 2013, 3
  • [23] Decoy-state quantum key distribution with practical light source
    Jiao Rong-Zhen
    Zhang Chao
    Ma Hai-Qiang
    ACTA PHYSICA SINICA, 2011, 60 (11)
  • [24] Reexamination of the decoy-state quantum key distribution with an unstable source
    Hu, Jia-Zhong
    Wang, Xiang-Bin
    PHYSICAL REVIEW A, 2010, 82 (01):
  • [25] Decoy-state quantum key distribution using homodyne detection
    Mousavi, S. H. Shams
    Gallion, P.
    PHYSICAL REVIEW A, 2009, 80 (01):
  • [26] A fully passive transmitter for decoy-state quantum key distribution
    Zapatero, Victor
    Wang, Wenyuan
    Curty, Marcos
    QUANTUM SCIENCE AND TECHNOLOGY, 2023, 8 (02)
  • [27] Practical covert quantum key distribution with decoy-state method
    Guo, Fen-Zhuo
    Liu, Li
    Wang, An-Kang
    Wen, Qiao-Yan
    QUANTUM INFORMATION PROCESSING, 2019, 18 (04)
  • [28] Optimizing Decoy-State Protocols for Practical Quantum Key Distribution Systems
    Fan-Yuan, Guan-Jie
    Wang, Ze-Hao
    Wang, Shuang
    Yin, Zhen-Qiang
    Chen, Wei
    He, De-Yong
    Guo, Guang-Can
    Han, Zheng-Fu
    ADVANCED QUANTUM TECHNOLOGIES, 2021, 4 (04)
  • [29] Efficient scheme for passive decoy-state reference-frame-independent quantum key distribution
    Zhu, Jian-Rong
    Zhang, Chun-Mei
    Wang, Qin
    PHYSICS LETTERS A, 2019, 383 (04) : 311 - 315
  • [30] Imperfect phase randomization and generalized decoy-state quantum key distribution
    Nahar, Shlok
    Upadhyaya, Twesh
    Lutkenhaus, Norbert
    PHYSICAL REVIEW APPLIED, 2023, 20 (06):