Finite-key analysis for round-robin-differential-phase-shift quantum key distribution

被引:3
作者
Liu, Hang [1 ,2 ]
Yin, Zhen-Qiang [1 ,2 ]
Wang, Rong [1 ,2 ]
Lu, Feng-Yu [1 ,2 ]
Wang, Shuang [1 ,2 ]
Chen, Wei [1 ,2 ]
Huang, Wei [1 ,2 ]
Xu, Bing-Jie [3 ]
Guo, Guang-Can [3 ]
Han, Zheng-Fu [1 ,2 ]
机构
[1] Univ Sci & Technol China, CAS Ctr Excellence Quantum Informat & Quantum Phy, CAS Key Lab Quantum Informat, Hefei 230026, Peoples R China
[2] State Key Lab Cryptol, POB 5159, Beijing 100878, Peoples R China
[3] Inst Southwestern Commun, Sci & Technol Commun Secur Lab, Chengdu 610041, Sichuan, Peoples R China
基金
中国国家自然科学基金;
关键词
Quantum cryptography;
D O I
10.1364/OE.391924
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
Since the round-robin-differential-phase-shift (RRDPS) quantum key distribution (QKD) protocol was proposed, it has attracted much attention due to its unique characteristic i.e., it can bind the amount of information leakage without monitoring signal disturbance. Recently, Yin et al. have developed a novel theory to estimate its information leakage tightly. However, the finite-sized key effects are not taken into account. Here, we fill this gap and extend the security proof of the RRDPS protocol to the finite-sized regime using post-selection technique. As a consequence, it's predicted that the key rate of RRDPS in a finite-sized key scenario can be comparable to the asymptotic one, which is meaningful for the real-life applications. (c) 2020 Optical Society of America under the terms of the OSA Open Access Publishing Agreement
引用
收藏
页码:15416 / 15423
页数:8
相关论文
共 35 条
  • [1] [Anonymous], 1984, P IEEE INT C COMP, DOI DOI 10.1016/J.TCS.2014.05.025
  • [2] Round-robin differential-phase-shift quantum key distribution with twisted photons
    Bouchard, Frederic
    Sit, Alicia
    Heshami, Khabat
    Fickler, Robert
    Karimi, Ebrahim
    [J]. PHYSICAL REVIEW A, 2018, 98 (01)
  • [3] Universally composable security: A new paradigm for cryptographic protocols
    Canetti, R
    [J]. 42ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 2001, : 136 - 145
  • [4] A MEASURE OF ASYMPTOTIC EFFICIENCY FOR TESTS OF A HYPOTHESIS BASED ON THE SUM OF OBSERVATIONS
    CHERNOFF, H
    [J]. ANNALS OF MATHEMATICAL STATISTICS, 1952, 23 (04): : 493 - 507
  • [5] Postselection Technique for Quantum Channels with Applications to Quantum Cryptography
    Christandl, Matthias
    Koenig, Robert
    Renner, Renato
    [J]. PHYSICAL REVIEW LETTERS, 2009, 102 (02)
  • [6] Twin-Field Quantum Key Distribution without Phase Postselection
    Cui, Chaohan
    Yin, Zhen-Qiang
    Wang, Rong
    Chen, Wei
    Wang, Shuang
    Guo, Guang-Can
    Han, Zheng-Fu
    [J]. PHYSICAL REVIEW APPLIED, 2019, 11 (03):
  • [7] Simple security proof of twin-field type quantum key distribution protocol
    Curty, Marcos
    Azuma, Koji
    Lo, Hoi-Kwong
    [J]. NPJ QUANTUM INFORMATION, 2019, 5 (1)
  • [8] Finite-key analysis for measurement-device-independent quantum key distribution
    Curty, Marcos
    Xu, Feihu
    Cui, Wei
    Lim, Charles Ci Wen
    Tamaki, Kiyoshi
    Lo, Hoi-Kwong
    [J]. NATURE COMMUNICATIONS, 2014, 5
  • [9] QUANTUM CRYPTOGRAPHY BASED ON BELL THEOREM
    EKERT, AK
    [J]. PHYSICAL REVIEW LETTERS, 1991, 67 (06) : 661 - 663
  • [10] Quantum key distribution system clocked at 2 GHz
    Gordon, KJ
    Fernandez, V
    Buller, GS
    Rech, I
    Cova, SD
    Townsend, PD
    [J]. OPTICS EXPRESS, 2005, 13 (08): : 3015 - 3020