Tight security bounds for decoy-state quantum key distribution

被引:0
|
作者
Hua-Lei Yin
Min-Gang Zhou
Jie Gu
Yuan-Mei Xie
Yu-Shuo Lu
Zeng-Bing Chen
机构
[1] Nanjing University,National Laboratory of Solid State Microstructures and School of Physics
[2] Zhongchuangwei Quantum Co.,undefined
[3] Ltd.,undefined
来源
Scientific Reports | / 10卷
关键词
D O I
暂无
中图分类号
学科分类号
摘要
The BB84 quantum key distribution (QKD) combined with decoy-state method is currently the most practical protocol, which has been proved secure against general attacks in the finite-key regime. Thereinto, statistical fluctuation analysis methods are very important in dealing with finite-key effects, which directly affect secret key rate, secure transmission distance and most importantly, the security. There are two tasks of statistical fluctuation in decoy-state BB84 QKD. One is the deviation between expected value and observed value for a given expected value or observed value. The other is the deviation between phase error rate of computational basis and bit error rate of dual basis. Here, we provide the rigorous and optimal analytic formula to solve the above tasks, resulting to higher secret key rate and longer secure transmission distance. Our results can be widely applied to deal with statistical fluctuation in quantum cryptography protocols.
引用
收藏
相关论文
共 50 条
  • [1] Tight security bounds for decoy-state quantum key distribution
    Yin, Hua-Lei
    Zhou, Min-Gang
    Gu, Jie
    Xie, Yuan-Mei
    Lu, Yu-Shuo
    Chen, Zeng-Bing
    SCIENTIFIC REPORTS, 2020, 10 (01)
  • [2] Security Bounds for Efficient Decoy-State Quantum Key Distribution
    Lucamarini, Marco
    Dynes, James F.
    Froehlich, Bernd
    Yuan, Zhiliang
    Shields, Andrew J.
    IEEE JOURNAL OF SELECTED TOPICS IN QUANTUM ELECTRONICS, 2015, 21 (03) : 1 - 8
  • [3] Concise security bounds for practical decoy-state quantum key distribution
    Lim, Charles Ci Wen
    Curty, Marcos
    Walenta, Nino
    Xu, Feihu
    Zbinden, Hugo
    PHYSICAL REVIEW A, 2014, 89 (02):
  • [4] Efficient decoy-state quantum key distribution with quantified security
    Lucamarini, M.
    Patel, K. A.
    Dynes, J. F.
    Froehlich, B.
    Sharpe, A. W.
    Dixon, A. R.
    Yuan, Z. L.
    Penty, R. V.
    Shields, A. J.
    OPTICS EXPRESS, 2013, 21 (21): : 24550 - 24565
  • [5] Security bounds for decoy-state quantum key distribution with arbitrary photon-number statistics
    Foletto, Giulio
    Picciariello, Francesco
    Agnesi, Costantino
    Villoresi, Paolo
    Vallone, Giuseppe
    PHYSICAL REVIEW A, 2022, 105 (01)
  • [6] Upper bounds for the secure key rate of the decoy-state quantum key distribution
    Curty, Marcos
    Moroder, Tobias
    Ma, Xiongfeng
    Lo, Hoi-Kwong
    Luetkenhaus, Norbert
    PHYSICAL REVIEW A, 2009, 79 (03):
  • [7] Security of Decoy-State Quantum Key Distribution with Correlated Intensity Fluctuations
    Sixto, Xoel
    Zapatero, Victor
    Curty, Marcos
    PHYSICAL REVIEW APPLIED, 2022, 18 (04)
  • [8] Improved security bounds against the Trojan-horse attack in decoy-state quantum key distribution
    Zijian Li
    Bingbing Zheng
    Chengxian Zhang
    Zhenrong Zhang
    Hong-Bo Xie
    Kejin Wei
    Quantum Information Processing, 23
  • [9] Improved security bounds against the Trojan-horse attack in decoy-state quantum key distribution
    Li, Zijian
    Zheng, Bingbing
    Zhang, Chengxian
    Zhang, Zhenrong
    Xie, Hong-Bo
    Wei, Kejin
    QUANTUM INFORMATION PROCESSING, 2024, 23 (02)
  • [10] Nonorthogonal decoy-state quantum key distribution
    Li, JB
    Fang, XM
    CHINESE PHYSICS LETTERS, 2006, 23 (04) : 775 - 778