Finite-key analysis for quantum conference key agreement with asymmetric channels

被引:26
|
作者
Li, Zhao
Cao, Xiao-Yu
Li, Chen-Long
Weng, Chen-Xun
Gu, Jie
Yin, Hua-Lei [1 ]
Chen, Zeng-Bing
机构
[1] Nanjing Univ, Natl Lab Solid State Microstruct, Sch Phys, Nanjing 210093, Peoples R China
基金
中国国家自然科学基金;
关键词
quantum conference key agreement; asymmetric channels; finite-key effects; twin-field; SECURITY; ENTANGLEMENT;
D O I
10.1088/2058-9565/ac1e00
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
As an essential ingredient of quantum networks, quantum conference key agreement (QCKA) provides unconditional secret keys among multiple parties, which enables only legitimate users to decrypt the encrypted message. Recently, some QCKA protocols employing twin-field was proposed to promote transmission distance. These protocols, however, suffer from relatively low conference key rate and short transmission distance over asymmetric channels, which demands a prompt solution in practice. Here, we consider a tripartite QCKA protocol utilizing the idea of sending-or-not-sending twin-field scheme and propose a high-efficiency QCKA over asymmetric channels by removing the symmetry parameters condition. Besides, we provide a composable finite-key analysis with rigorous security proof against general attacks by exploiting the entropic uncertainty relation for multiparty system. Our protocol greatly improves the feasibility to establish conference keys over asymmetric channels.
引用
收藏
页数:8
相关论文
共 50 条
  • [31] Finite-key analysis for round-robin-differential-phase-shift quantum key distribution
    Liu, Hang
    Yin, Zhen-Qiang
    Wang, Rong
    Lu, Feng-Yu
    Wang, Shuang
    Chen, Wei
    Huang, Wei
    Xu, Bing-Jie
    Guo, Guang-Can
    Han, Zheng-Fu
    OPTICS EXPRESS, 2020, 28 (10) : 15416 - 15423
  • [32] Security of the traditional quantum key distribution protocols with finite-key lengths
    Feng, Bao
    Huang, Hai-Dong
    Bian, Yu-Xiang
    Jia, Wei
    Zhou, Xing-Yu
    Wang, Qin
    CHINESE PHYSICS B, 2023, 32 (03)
  • [33] Finite-key security against coherent attacks in quantum key distribution
    Sheridan, Lana
    Le, Thinh Phuc
    Scarani, Valerio
    NEW JOURNAL OF PHYSICS, 2010, 12
  • [34] Security of the traditional quantum key distribution protocols with finite-key lengths
    冯宝
    黄海东
    卞宇翔
    贾玮
    周星宇
    王琴
    Chinese Physics B, 2023, 32 (03) : 148 - 152
  • [35] Finite-key analysis for quantum key distribution with weak coherent pulses based on Bernoulli sampling
    Kawakami, Shun
    Sasaki, Toshihiko
    Koashi, Masato
    PHYSICAL REVIEW A, 2017, 96 (01)
  • [36] Finite-key analysis for memory-assisted decoy-state quantum key distribution
    Lorenzo, Guillermo Curras
    Razavi, Mohsen
    NEW JOURNAL OF PHYSICS, 2020, 22 (10):
  • [37] Finite-key analysis for time-energy high-dimensional quantum key distribution
    Niu, Murphy Yuezhen
    Xu, Feihu
    Shapiro, Jeffrey H.
    Furrer, Fabian
    PHYSICAL REVIEW A, 2016, 94 (05)
  • [38] Finite-Key Analysis of 1-Decoy Method Quantum Key Distribution with Intensity Fluctuation
    Zhou, Chun
    Zhou, Yu
    Xu, Yangbin
    Wang, Yang
    Lu, Yifei
    Jiang, Musheng
    Zhang, Xiaoxu
    Bao, Wansu
    APPLIED SCIENCES-BASEL, 2022, 12 (09):
  • [39] Finite-key analysis for one-sided device-independent quantum key distribution
    Wang, Yang
    Bao, Wan-su
    Li, Hong-wei
    Zhou, Chun
    Li, Yuan
    PHYSICAL REVIEW A, 2013, 88 (05):
  • [40] Finite-key analysis for practical implementations of quantum key distribution (vol 11, 045024, 2009)
    Cai, Raymond Y. Q.
    Scarani, Valerio
    NEW JOURNAL OF PHYSICS, 2009, 11