Continuous-variable measurement-device-independent quantum key distribution: Composable security against coherent attacks

被引:79
|
作者
Lupo, Cosmo [1 ]
Ottaviani, Carlo [1 ]
Papanastasiou, Panagiotis [1 ]
Pirandola, Stefano [1 ]
机构
[1] Univ York, Dept Comp Sci, York YO10 5GH, N Yorkshire, England
基金
英国工程与自然科学研究理事会;
关键词
CRYPTOGRAPHY; INFORMATION; DISCRETE; INTERNET;
D O I
10.1103/PhysRevA.97.052327
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
We present a rigorous security analysis of continuous-variable measurement- device-independent quantum key distribution (CV MDI QKD) in a finite-size scenario. The security proof is obtained in two steps: by first assessing the security against collective Gaussian attacks, and then extending to the most general class of coherent attacks via the Gaussian de Finetti reduction. Our result combines recent state-of-the-art security proofs for CV QKD with findings about min-entropy calculus and parameter estimation. In doing so, we improve the finite-size estimate of the secret key rate. Our conclusions confirm that CV MDI protocols allow for high rates on the metropolitan scale, and may achieve a nonzero secret key rate against the most general class of coherent attacks after 10(7)-10(9) quantum signal transmissions, depending on loss and noise, and on the required level of security.
引用
收藏
页数:10
相关论文
共 50 条
  • [1] Composable security analysis of continuous-variable measurement-device-independent quantum key distribution with squeezed states for coherent attacks
    Chen, Ziyang
    Zhang, Yichen
    Wang, Gan
    Li, Zhengyu
    Guo, Hong
    PHYSICAL REVIEW A, 2018, 98 (01)
  • [2] Implementation of continuous-variable quantum key distribution with composable and one-sided-device-independent security against coherent attacks
    Gehring, Tobias
    Haendchen, Vitus
    Duhme, Joerg
    Furrer, Fabian
    Franz, Torsten
    Pacher, Christoph
    Werner, Reinhard F.
    Schnabel, Roman
    NATURE COMMUNICATIONS, 2015, 6
  • [3] Implementation of continuous-variable quantum key distribution with composable and one-sided-device-independent security against coherent attacks
    Tobias Gehring
    Vitus Händchen
    Jörg Duhme
    Fabian Furrer
    Torsten Franz
    Christoph Pacher
    Reinhard F. Werner
    Roman Schnabel
    Nature Communications, 6
  • [4] Continuous-variable measurement-device-independent quantum key distribution
    Li, Zhengyu
    Zhang, Yi-Chen
    Xu, Feihu
    Peng, Xiang
    Guo, Hong
    PHYSICAL REVIEW A, 2014, 89 (05):
  • [5] Unidimensional continuous-variable measurement-device-independent quantum key distribution
    Bai, Dongyun
    Huang, Peng
    Zhu, Yiqun
    Ma, Hongxin
    Xiao, Tailong
    Wang, Tao
    Zeng, Guihua
    QUANTUM INFORMATION PROCESSING, 2020, 19 (02)
  • [6] Unidimensional continuous-variable measurement-device-independent quantum key distribution
    Dongyun Bai
    Peng Huang
    Yiqun Zhu
    Hongxin Ma
    Tailong Xiao
    Tao Wang
    Guihua Zeng
    Quantum Information Processing, 2020, 19
  • [7] Security of continuous-variable measurement-device-independent quantum key distribution with imperfect state preparation
    Ma, Hong-Xin
    Huang, Peng
    Wang, Tao
    Wang, Shi-Yu
    Bao, Wan-Su
    Zeng, Gui-Hua
    PHYSICS LETTERS A, 2019, 383 (36)
  • [8] Impact of Imbalanced Modulation on Security of Continuous-Variable Measurement-Device-Independent Quantum Key Distribution
    Liu, Wenyuan
    Liu, Zehui
    Bai, Jiandong
    Jie, Qi
    Zhang, Guangwei
    Tian, Yan
    Jin, Jingjing
    PHOTONICS, 2024, 11 (07)
  • [9] Continuous-Variable Measurement-Device-Independent Quantum Key Distribution in the Terahertz Band
    Liu, Haoxin
    Yang, Zhe
    Yang, Shuoyu
    Sun, Dongyun
    Zhang, Cunlin
    PHOTONICS, 2024, 11 (04)
  • [10] Continuous-Variable Measurement-Device-Independent Quantum Key Distribution with Imperfect Detectors
    Li, Zhengyu
    Peng, Xiang
    Guo, Hong
    2014 CONFERENCE ON LASERS AND ELECTRO-OPTICS (CLEO), 2014,