Improved statistical fluctuation analysis for measurement-device-independent quantum key distribution

被引:1
作者
Hua-Jian Ding
Chen-Chen Mao
Chun-Mei Zhang
Qin Wang
机构
[1] Nanjing University of Posts and Telecommunications,Institute of Quantum Information and Technology
[2] Nanjing University of Posts and Telecommunications,Key Lab of Broadband Wireless Communication and Sensor Network Technology
[3] Ministry of Education,undefined
来源
Quantum Information Processing | 2018年 / 17卷
关键词
Quantum key distribution; Statistical fluctuation analysis; Decoy state;
D O I
暂无
中图分类号
学科分类号
摘要
Measurement-device-independent quantum key distribution (MDI-QKD) is a promising protocol for realizing long-distance secret keys sharing. However, its key rate is relatively low when the finite-size effect is taken into account. In this paper, we consider statistical fluctuation analysis for the three-intensity decoy-state MDI-QKD system based on the recent work (Zhang et al. in Phys Rev A 95:012333, 2017) and further compare its performance with that of applying the Gaussian approximation technique and the Chernoff bound method. The numerical simulations demonstrate that the new method has apparent enhancement both in key generation rate and transmission distance than using Chernoff bound method. Meanwhile, the present work still shows much higher security than Gaussian approximation analysis.
引用
收藏
相关论文
共 107 条
[1]  
Bennett CH(2014)Quantum cryptography: public key distribution and coin tossing Theor. Comput. Sci. 560 7-11
[2]  
Brassard G(1999)Quantum cryptography based on Bells theorem Phys. Rev. Lett. 67 661-663
[3]  
Ekert AK(1999)Unconditional security of quantum key distribution over arbitrarily long distances Science 283 2050-2056
[4]  
Lo HK(2000)Simple proof of security of the BB84 quantum key distribution protocol Phys. Rev. Lett. 85 441-444
[5]  
Chau HF(2001)Unconditional security in quantum cryptography J. ACM 48 351-406
[6]  
Shor PW(2004)Security of quantum key distribution with imperfect devices Quantum Inf. Comput. 4 325-360
[7]  
Preskill J(2000)Limitations on practical quantum cryptography Phys. Rev. Lett. 85 1330-1333
[8]  
Mayers D(2000)Security against individual attacks for realistic quantum key distribution Phys. Rev. A 5 052304-82
[9]  
Gottesman D(2007)Phase-remapping attack in practical quantum-key-distribution systems Phys. Rev. A 75 032314-705
[10]  
Lo HK(2010)Experimental demonstration of phase-remapping attack in a practical quantum key distribution system New J. Phys. 12 113026-2125