Experimental quantum key distribution with finite-key security analysis for noisy channels

被引:39
|
作者
Bacco, Davide [1 ]
Canale, Matteo [1 ]
Laurenti, Nicola [1 ]
Vallone, Giuseppe [1 ]
Villoresi, Paolo [1 ]
机构
[1] Univ Padua, Dept Informat Engn, I-35131 Padua, Italy
来源
NATURE COMMUNICATIONS | 2013年 / 4卷
关键词
CRYPTOGRAPHY; STATES;
D O I
10.1038/ncomms3363
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
In quantum key distribution implementations, each session is typically chosen long enough so that the secret key rate approaches its asymptotic limit. However, this choice may be constrained by the physical scenario, as in the perspective use with satellites, where the passage of one terminal over the other is restricted to a few minutes. Here we demonstrate experimentally the extraction of secure keys leveraging an optimal design of the prepare-and-measure scheme, according to recent finite-key theoretical tight bounds. The experiment is performed in different channel conditions, and assuming two distinct attack models: individual attacks or general quantum attacks. The request on the number of exchanged qubits is then obtained as a function of the key size and of the ambient quantum bit error rate. The results indicate that viable conditions for effective symmetric, and even one-time-pad, cryptography are achievable.
引用
收藏
页数:8
相关论文
共 50 条
  • [1] Experimental quantum key distribution with finite-key security analysis for noisy channels
    Davide Bacco
    Matteo Canale
    Nicola Laurenti
    Giuseppe Vallone
    Paolo Villoresi
    Nature Communications, 4
  • [2] Finite-key security analysis for multilevel quantum key distribution
    Bradler, Kamil
    Mirhosseini, Mohammad
    Fickler, Robert
    Broadbent, Anne
    Boyd, Robert
    NEW JOURNAL OF PHYSICS, 2016, 18
  • [3] Finite-key security of passive quantum key distribution
    Zapatero, Victor
    Curty, Marcos
    PHYSICAL REVIEW APPLIED, 2024, 21 (01)
  • [4] Finite-key security analysis for quantum key distribution with leaky sources
    Wang, Weilong
    Tamaki, Kiyoshi
    Curty, Marcos
    NEW JOURNAL OF PHYSICS, 2018, 20
  • [5] Finite-key security analysis of quantum key distribution with imperfect light sources
    Mizutani, Akihiro
    Curty, Marcos
    Lim, Charles Ci Wen
    Imoto, Nobuyuki
    Tamaki, Kiyoshi
    NEW JOURNAL OF PHYSICS, 2015, 17
  • [6] Numerical finite-key analysis of quantum key distribution
    Darius Bunandar
    Luke C. G. Govia
    Hari Krovi
    Dirk Englund
    npj Quantum Information, 6
  • [7] Numerical finite-key analysis of quantum key distribution
    Bunandar, Darius
    Govia, Luke C. G.
    Krovi, Hari
    Englund, Dirk
    NPJ QUANTUM INFORMATION, 2020, 6 (01)
  • [8] Finite-key security analysis of differential-phase-shift quantum key distribution
    Mizutani, Akihiro
    Takeuchi, Yuki
    Tamaki, Kiyoshi
    PHYSICAL REVIEW RESEARCH, 2023, 5 (02):
  • [9] Finite-key analysis for twin-field quantum key distribution with composable security
    Hua-Lei Yin
    Zeng-Bing Chen
    Scientific Reports, 9
  • [10] Security of the traditional quantum key distribution protocols with finite-key lengths
    Feng, Bao
    Huang, Hai-Dong
    Bian, Yu-Xiang
    Jia, Wei
    Zhou, Xing-Yu
    Wang, Qin
    CHINESE PHYSICS B, 2023, 32 (03)