FINITE-KEY ANALYSIS FOR QUANTUM KEY DISTRIBUTION WITH DECOY STATES

被引:0
|
作者
Song, Ting-Ting [1 ,2 ]
Zhang, Jie [3 ]
Qin, Su-Juan [1 ]
Gao, Fei [1 ]
Wen, Qiao-Yan [1 ]
机构
[1] Beijing Univ Posts & Telecommun, State Key Lab Networking & Switching Technol, Beijing 100876, Peoples R China
[2] Xidian Univ, State Key Lab Integrated Serv Network, Xian 710071, Peoples R China
[3] Beijing Univ Posts & Telecommun, Sch Sci, Beijing 100876, Peoples R China
关键词
Finite key; Quantum key distribution; Decoy states; SECURITY; CRYPTOGRAPHY; RESOURCES; PROOF;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We analyze the security of finite-resource quantum key distribution with decoy states, and present the security bound for the practical implementations by introducing the deviations of the probability of sending a k-photon pulse and the error rate of the quantum state. The bound is simulated under reasonable values of the observed parameters. Compared with the previous works, the security bound is more stringent.
引用
收藏
页码:374 / 389
页数:16
相关论文
共 50 条
  • [1] Finite-key analysis for memory-assisted decoy-state quantum key distribution
    Lorenzo, Guillermo Curras
    Razavi, Mohsen
    NEW JOURNAL OF PHYSICS, 2020, 22 (10):
  • [2] Finite-Key Analysis of 1-Decoy Method Quantum Key Distribution with Intensity Fluctuation
    Zhou, Chun
    Zhou, Yu
    Xu, Yangbin
    Wang, Yang
    Lu, Yifei
    Jiang, Musheng
    Zhang, Xiaoxu
    Bao, Wansu
    APPLIED SCIENCES-BASEL, 2022, 12 (09):
  • [3] Numerical finite-key analysis of quantum key distribution
    Darius Bunandar
    Luke C. G. Govia
    Hari Krovi
    Dirk Englund
    npj Quantum Information, 6
  • [4] Numerical finite-key analysis of quantum key distribution
    Bunandar, Darius
    Govia, Luke C. G.
    Krovi, Hari
    Englund, Dirk
    NPJ QUANTUM INFORMATION, 2020, 6 (01)
  • [5] Tight finite-key analysis of a practical decoy-state quantum key distribution with unstable sources
    Wang, Yang
    Bao, Wan-Su
    Zhou, Chun
    Jiang, Mu-Sheng
    Li, Hong-Wei
    PHYSICAL REVIEW A, 2016, 94 (03)
  • [6] Finite-key analysis of a practical decoy-state high-dimensional quantum key distribution
    Bao, Haize
    Bao, Wansu
    Wang, Yang
    Zhou, Chun
    Chen, Ruike
    JOURNAL OF PHYSICS A-MATHEMATICAL AND THEORETICAL, 2016, 49 (20)
  • [7] Finite-key analysis for practical implementations of quantum key distribution
    Cai, Raymond Y. Q.
    Scarani, Valerio
    NEW JOURNAL OF PHYSICS, 2009, 11
  • [8] Finite-key security analysis for multilevel quantum key distribution
    Bradler, Kamil
    Mirhosseini, Mohammad
    Fickler, Robert
    Broadbent, Anne
    Boyd, Robert
    NEW JOURNAL OF PHYSICS, 2016, 18
  • [9] Tight finite-key analysis for passive decoy-state quantum key distribution under general attacks
    Zhou, Chun
    Bao, Wan-Su
    Li, Hong-Wei
    Wang, Yang
    Li, Yuan
    Yin, Zhen-Qiang
    Chen, Wei
    Han, Zheng-Fu
    PHYSICAL REVIEW A, 2014, 89 (05):
  • [10] Finite-key security analysis for quantum key distribution with leaky sources
    Wang, Weilong
    Tamaki, Kiyoshi
    Curty, Marcos
    NEW JOURNAL OF PHYSICS, 2018, 20