FINITE-KEY ANALYSIS FOR QUANTUM KEY DISTRIBUTION WITH DECOY STATES

被引:0
|
作者
Song, Ting-Ting [1 ,2 ]
Zhang, Jie [3 ]
Qin, Su-Juan [1 ]
Gao, Fei [1 ]
Wen, Qiao-Yan [1 ]
机构
[1] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
[2] Xidian Univ, State Key Lab Integrated Serv Network, Xian 710071, Peoples R China
[3] Beijing Univ Posts & Telecommun, Sch Sci, Beijing 100876, Peoples R China
关键词
Finite key; Quantum key distribution; Decoy states; SECURITY; CRYPTOGRAPHY; RESOURCES; PROOF;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We analyze the security of finite-resource quantum key distribution with decoy states, and present the security bound for the practical implementations by introducing the deviations of the probability of sending a k-photon pulse and the error rate of the quantum state. The bound is simulated under reasonable values of the observed parameters. Compared with the previous works, the security bound is more stringent.
引用
收藏
页码:374 / 389
页数:16
相关论文
共 50 条
  • [31] Tight finite-key analysis for quantum cryptography
    Tomamichel, Marco
    Lim, Charles Ci Wen
    Gisin, Nicolas
    Renner, Renato
    NATURE COMMUNICATIONS, 2012, 3
  • [32] Quantum key distribution with distinguishable decoy states
    Huang, Anqi
    Sun, Shi-Hai
    Liu, Zhihong
    Makarov, Vadim
    PHYSICAL REVIEW A, 2018, 98 (01)
  • [33] Security of the decoy state method for quantum key distribution
    Trushechkin, A. S.
    Kiktenko, E. O.
    Kronberg, D. A.
    Fedorov, A. K.
    PHYSICS-USPEKHI, 2021, 64 (01) : 88 - 102
  • [34] Finite-key analysis of sending-or-not-sending twin-field quantum key distribution with intensity fluctuations
    Lu, Yi-Fei
    Wang, Yang
    Jiang, Mu-Sheng
    Liu, Fan
    Zhang, Xiao-Xu
    Bao, Wan-Su
    QUANTUM INFORMATION PROCESSING, 2021, 20 (04)
  • [35] Finite-key analysis for one-sided device-independent quantum key distribution
    Wang, Yang
    Bao, Wan-su
    Li, Hong-wei
    Zhou, Chun
    Li, Yuan
    PHYSICAL REVIEW A, 2013, 88 (05):
  • [36] Finite-key analysis for quantum conference key agreement with asymmetric channels
    Li, Zhao
    Cao, Xiao-Yu
    Li, Chen-Long
    Weng, Chen-Xun
    Gu, Jie
    Yin, Hua-Lei
    Chen, Zeng-Bing
    QUANTUM SCIENCE AND TECHNOLOGY, 2021, 6 (04)
  • [37] Finite-key analysis for the 1-decoy state QKD protocol
    Rusca, Davide
    Boaron, Alberto
    Grunenfelder, Fadri
    Martin, Anthony
    Zbinden, Hugo
    APPLIED PHYSICS LETTERS, 2018, 112 (17)
  • [38] Repeaterless quantum key distribution with efficient finite-key analysis overcoming the rate-distance limit
    Maeda, Kento
    Sasaki, Toshihiko
    Koashi, Masato
    NATURE COMMUNICATIONS, 2019, 10 (1)
  • [39] Improved finite-key security analysis of quantum key distribution against Trojan-horse attacks
    Navarrete, Alvaro
    Curty, Marcos
    QUANTUM SCIENCE AND TECHNOLOGY, 2022, 7 (03)
  • [40] Finite-key analysis of loss-tolerant quantum key distribution based on random sampling theory
    Curras-Lorenzo, Guillermo
    Navarrete, Alvaro
    Pereira, Margarida
    Tamaki, Kiyoshi
    PHYSICAL REVIEW A, 2021, 104 (01)