Finite-size analysis of a continuous-variable quantum key distribution

被引:361
作者
Leverrier, Anthony [1 ]
Grosshans, Frederic [2 ]
Grangier, Philippe [3 ]
机构
[1] CNRS LTCI, Inst Telecom Telecom ParisTech, F-75634 Paris 13, France
[2] ICFO, E-08860 Castelldefels, Barcelona, Spain
[3] Univ Paris Sud, CNRS, Inst Opt, Lab Charles Fabry, F-91127 Palaiseau, France
来源
PHYSICAL REVIEW A | 2010年 / 81卷 / 06期
关键词
ENTANGLEMENT; SECURITY;
D O I
10.1103/PhysRevA.81.062343
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
The goal of this paper is to extend the framework of finite-size analysis recently developed for quantum key distribution to continuous-variable protocols. We do not solve this problem completely here, and we mainly consider the finite-size effects on the parameter estimation procedure. Despite the fact that some questions are left open, we are able to give an estimation of the secret key rate for protocols which do not contain a postselection procedure. As expected, these results are significantly more pessimistic than those obtained in the asymptotic regime. However, we show that recent continuous-variable protocols are able to provide fully secure secret keys in the finite-size scenario, over distances larger than 50 km.
引用
收藏
页数:11
相关论文
共 42 条
[21]   Decoy state quantum key distribution [J].
Lo, HK ;
Ma, XF ;
Chen, K .
PHYSICAL REVIEW LETTERS, 2005, 94 (23)
[22]   Tight bound on the coherent-state quantum key distribution with heterodyne detection [J].
Lodewyck, Jerome ;
Grangier, Philippe .
PHYSICAL REVIEW A, 2007, 76 (02)
[23]  
MONTFORT A, 1997, COURS STAT MATH
[24]   Optimality of Gaussian attacks in continuous-variable quantum cryptography [J].
Navascues, Miguel ;
Grosshans, Frederic ;
Acin, Antonio .
PHYSICAL REVIEW LETTERS, 2006, 97 (19)
[25]   Device-independent quantum key distribution secure against collective attacks [J].
Pironio, Stefano ;
Acin, Antonio ;
Brunner, Nicolas ;
Gisin, Nicolas ;
Massar, Serge ;
Scarani, Valerio .
NEW JOURNAL OF PHYSICS, 2009, 11
[26]   Entanglement and the foundations of statistical mechanics [J].
Popescu, Sandu ;
Short, Anthony J. ;
Winter, Andreas .
NATURE PHYSICS, 2006, 2 (11) :754-758
[27]   Information-theoretic security proof for quantum-key-distribution protocols [J].
Renner, R ;
Gisin, N ;
Kraus, B .
PHYSICAL REVIEW A, 2005, 72 (01)
[28]   de Finetti Representation Theorem for Infinite-Dimensional Quantum Systems and Applications to Quantum Cryptography [J].
Renner, R. ;
Cirac, J. I. .
PHYSICAL REVIEW LETTERS, 2009, 102 (11)
[29]  
Renner R., 2005, PhD thesis
[30]  
RENNER R, 2004, IEEE INT S INFORM TH, V2004, P233