Security Bounds for Efficient Decoy-State Quantum Key Distribution

被引:16
|
作者
Lucamarini, Marco [1 ,2 ]
Dynes, James F. [1 ,2 ]
Froehlich, Bernd [1 ]
Yuan, Zhiliang [1 ,2 ]
Shields, Andrew J. [1 ,2 ]
机构
[1] Toshiba Res Europe Ltd, Cambridge CB40GZ, England
[2] Toshiba Corp Res & Dev Ctr, Kawasaki, Kanagawa 2128582, Japan
关键词
Quantum communications; quantum key distribution; finite-size effects; BB84; protocol; collective attacks; sampling theory; confidence interval; independent identically distributed random variables; PROBABILITY-INEQUALITIES; UNCONDITIONAL SECURITY; PROOF;
D O I
10.1109/JSTQE.2015.2394774
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Information-theoretical security of quantum key distribution (QKD) has been convincingly proven in recent years and remarkable experiments have shown the potential of QKD for real-world applications. Due to its unique capability of combining high key rate and security in a realistic finite-size scenario, the efficient version of the BB84 QKD protocol endowed with decoy states has been subject of intensive research. Its recent experimental implementation finally demonstrated a secure key rate beyond 1 Mb/s over a 50 km of optical fiber. However, the achieved rate holds under the restrictive assumption that the eavesdropper performs collective attacks. Here, we review the protocol and generalize its security. We exploit a map by Ahrens to rigorously upper bound the hypergeometric distribution resulting from a general eavesdropping. Despite the extended applicability of the new protocol, its key rate is only marginally smaller than its predecessor in all cases of practical interest.
引用
收藏
页码:1 / 8
页数:8
相关论文
共 50 条
  • [31] Photon-number-resolving decoy-state quantum key distribution
    Cai, QY
    Tan, YG
    PHYSICAL REVIEW A, 2006, 73 (03):
  • [32] Fair Efficiency Comparisons of Decoy-State Quantum Key Distribution Protocols
    Li Hongxin
    Gao Ming
    Yan Xueping
    Yan Bao
    Han Yu
    Shan Ling
    Ma Zhi
    CHINESE JOURNAL OF ELECTRONICS, 2018, 27 (02) : 241 - 249
  • [33] Fair Efficiency Comparisons of Decoy-State Quantum Key Distribution Protocols
    LI Hongxin
    GAO Ming
    YAN Xueping
    YAN Bao
    HAN Yu
    SHAN Ling
    MA Zhi
    Chinese Journal of Electronics, 2018, 27 (02) : 241 - 249
  • [34] A Simple Scheme for Realizing the Passive Decoy-State Quantum Key Distribution
    Zhang, Chun-Hui
    Wang, Dong
    Zhang, Chun-Mei
    Wang, Qin
    JOURNAL OF LIGHTWAVE TECHNOLOGY, 2018, 36 (14) : 2868 - 2873
  • [35] Passive decoy-state quantum key distribution with practical light sources
    Curty, Marcos
    Ma, Xiongfeng
    Qi, Bing
    Moroder, Tobias
    PHYSICAL REVIEW A, 2010, 81 (02)
  • [36] Experimental composable security decoy-state quantum key distribution using time-phase encoding
    Yin, Hua-Lei
    Liu, Peng
    Dai, Wei-Wei
    Ci, Zhao-Hui
    Gu, Jie
    Gao, Tian
    Wang, Qiang-Wei
    Shen, Zi-Yao
    OPTICS EXPRESS, 2020, 28 (20): : 29479 - +
  • [37] Security of the decoy state method for quantum key distribution
    Trushechkin, A. S.
    Kiktenko, E. O.
    Kronberg, D. A.
    Fedorov, A. K.
    PHYSICS-USPEKHI, 2021, 64 (01) : 88 - 102
  • [38] Decoy-state method for quantum-key-distribution-based quantum private query
    Bin Liu
    Shuang Xia
    Di Xiao
    Wei Huang
    Bingjie Xu
    Yang Li
    Science China Physics, Mechanics & Astronomy, 2022, 65
  • [39] Practical decoy-state BB84 quantum key distribution with quantum memory
    李咸柯
    宋小谦
    郭其伟
    周星宇
    王琴
    Chinese Physics B, 2021, (06) : 77 - 80
  • [40] Decoy-state method for quantum-key-distribution-based quantum private query
    Liu, Bin
    Xia, Shuang
    Xiao, Di
    Huang, Wei
    Xu, Bingjie
    Li, Yang
    SCIENCE CHINA-PHYSICS MECHANICS & ASTRONOMY, 2022, 65 (04)