Security Bounds for Efficient Decoy-State Quantum Key Distribution

被引:16
|
作者
Lucamarini, Marco [1 ,2 ]
Dynes, James F. [1 ,2 ]
Froehlich, Bernd [1 ]
Yuan, Zhiliang [1 ,2 ]
Shields, Andrew J. [1 ,2 ]
机构
[1] Toshiba Res Europe Ltd, Cambridge CB40GZ, England
[2] Toshiba Corp Res & Dev Ctr, Kawasaki, Kanagawa 2128582, Japan
关键词
Quantum communications; quantum key distribution; finite-size effects; BB84; protocol; collective attacks; sampling theory; confidence interval; independent identically distributed random variables; PROBABILITY-INEQUALITIES; UNCONDITIONAL SECURITY; PROOF;
D O I
10.1109/JSTQE.2015.2394774
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Information-theoretical security of quantum key distribution (QKD) has been convincingly proven in recent years and remarkable experiments have shown the potential of QKD for real-world applications. Due to its unique capability of combining high key rate and security in a realistic finite-size scenario, the efficient version of the BB84 QKD protocol endowed with decoy states has been subject of intensive research. Its recent experimental implementation finally demonstrated a secure key rate beyond 1 Mb/s over a 50 km of optical fiber. However, the achieved rate holds under the restrictive assumption that the eavesdropper performs collective attacks. Here, we review the protocol and generalize its security. We exploit a map by Ahrens to rigorously upper bound the hypergeometric distribution resulting from a general eavesdropping. Despite the extended applicability of the new protocol, its key rate is only marginally smaller than its predecessor in all cases of practical interest.
引用
收藏
页码:1 / 8
页数:8
相关论文
共 50 条
  • [41] Practical decoy-state BB84 quantum key distribution with quantum memory*
    Li, Xian-Ke
    Song, Xiao-Qian
    Guo, Qi-Wei
    Zhou, Xing-Yu
    Wang, Qin
    CHINESE PHYSICS B, 2021, 30 (06)
  • [42] Nonorthogonal decoy-state quantum key distribution based on coherent-state superpositions
    Sun Wei
    Yin Hua-Lei
    Sun Xiang-Xiang
    Chen Teng-Yun
    ACTA PHYSICA SINICA, 2016, 65 (08)
  • [43] Decoy-state method for quantum-key-distribution-based quantum private query
    Bin Liu
    Shuang Xia
    Di Xiao
    Wei Huang
    Bingjie Xu
    Yang Li
    Science China(Physics,Mechanics & Astronomy), 2022, Mechanics & Astronomy)2022 (04) : 45 - 52
  • [44] Nonorthogonal passive decoy-state quantum key distribution with a weak coherent state source
    Zhou Yuan-Yuan
    Zhou Xue-Jun
    ACTA PHYSICA SINICA, 2011, 60 (10)
  • [45] Robust decoy-state quantum key distribution with heralded single photon source
    Wang, Q.
    Chen, W.
    Xavier, G.
    Swillo, M.
    Sauge, S.
    Tengner, M.
    Zhang, T.
    Han, Z. F.
    Guo, G. C.
    Karlsson, A.
    2008 CONFERENCE ON LASERS AND ELECTRO-OPTICS & QUANTUM ELECTRONICS AND LASER SCIENCE CONFERENCE, VOLS 1-9, 2008, : 3589 - +
  • [46] Passive decoy-state quantum key distribution with the SARG04 protocol
    Liu, Kang
    Wei, Jie
    Zhang, Chun-Mei
    Wang, Qin
    JOURNAL OF THE OPTICAL SOCIETY OF AMERICA B-OPTICAL PHYSICS, 2018, 35 (05) : 1066 - 1071
  • [47] Decoy-state quantum key distribution with polarized photons over 200 km
    Liu, Yang
    Chen, Teng-Yun
    Wang, Jian
    Cai, Wen-Qi
    Wan, Xu
    Chen, Luo-Kan
    Wang, Jin-Hong
    Liu, Shu-Bin
    Liang, Hao
    Yang, Lin
    Peng, Cheng-Zhi
    Chen, Kai
    Chen, Zeng-Bing
    Pan, Jian-Wei
    OPTICS EXPRESS, 2010, 18 (08): : 8587 - 8594
  • [48] Performance of passive decoy-state quantum key distribution with mismatched local detectors
    Yu, Kai
    Zhang, Chun-Hui
    Zhou, Xing-Yu
    Wang, Qin
    COMMUNICATIONS IN THEORETICAL PHYSICS, 2022, 74 (01)
  • [49] General theory for decoy-state quantum key distribution with an arbitrary number of intensities
    Hayashi, Masahito
    NEW JOURNAL OF PHYSICS, 2007, 9
  • [50] Practical decoy-state method for twin-field quantum key distribution
    Grasselli, Federico
    Curty, Marcos
    NEW JOURNAL OF PHYSICS, 2019, 21 (07)