Practical issues in decoy-state quantum key distribution based on the central limit theorem

被引:15
|
作者
Trushechkin, A. S. [1 ,2 ,3 ,4 ,5 ]
Kiktenko, E. O. [1 ,5 ,6 ,7 ]
Fedorov, A. K. [3 ,4 ,5 ,7 ]
机构
[1] Russian Acad Sci, Steklov Math Inst, Moscow 119991, Russia
[2] Natl Res Nucl Univ MEPhI, Moscow 115409, Russia
[3] Natl Univ Sci & Technol MISiS, Dept Math, Moscow 119049, Russia
[4] Natl Univ Sci & Technol MISiS, Russian Quantum Ctr, Moscow 119049, Russia
[5] Russian Quantum Ctr, Moscow 143025, Russia
[6] Bauman Moscow State Tech Univ, Moscow 105005, Russia
[7] QApp, Moscow 143025, Russia
关键词
CRYPTOGRAPHY; SECURITY;
D O I
10.1103/PhysRevA.96.022316
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
Decoy-state quantum key distribution (QKD) is a standard tool for long-distance quantum communications. An important issue in this field is processing the decoy-state statistics taking into account statistical fluctuations (or "finite-key effects"). In this work, we propose and analyze an option for decoy statistics processing, which is based on the central limit theorem. We discuss such practical issues as inclusion of the failure probability of the decoy-state statistical estimates in the total failure probability of a QKD protocol and also taking into account the deviations of the binomially distributed random variables used in the estimations from the Gaussian distribution. The results of numerical simulations show that the obtained estimations are quite tight. The proposed technique can be used as a part of post-processing procedures for industrial quantum key distribution systems.
引用
收藏
页数:7
相关论文
共 50 条
  • [1] Practical covert quantum key distribution with decoy-state method
    Fen-Zhuo Guo
    Li Liu
    An-Kang Wang
    Qiao-Yan Wen
    [J]. Quantum Information Processing, 2019, 18
  • [2] Decoy-state quantum key distribution with practical light source
    Jiao Rong-Zhen
    Zhang Chao
    Ma Hai-Qiang
    [J]. ACTA PHYSICA SINICA, 2011, 60 (11)
  • [3] Practical covert quantum key distribution with decoy-state method
    Guo, Fen-Zhuo
    Liu, Li
    Wang, An-Kang
    Wen, Qiao-Yan
    [J]. QUANTUM INFORMATION PROCESSING, 2019, 18 (04)
  • [4] Optimizing Decoy-State Protocols for Practical Quantum Key Distribution Systems
    Fan-Yuan, Guan-Jie
    Wang, Ze-Hao
    Wang, Shuang
    Yin, Zhen-Qiang
    Chen, Wei
    He, De-Yong
    Guo, Guang-Can
    Han, Zheng-Fu
    [J]. ADVANCED QUANTUM TECHNOLOGIES, 2021, 4 (04)
  • [5] Passive decoy-state quantum key distribution with practical light sources
    Curty, Marcos
    Ma, Xiongfeng
    Qi, Bing
    Moroder, Tobias
    [J]. PHYSICAL REVIEW A, 2010, 81 (02)
  • [6] Concise security bounds for practical decoy-state quantum key distribution
    Lim, Charles Ci Wen
    Curty, Marcos
    Walenta, Nino
    Xu, Feihu
    Zbinden, Hugo
    [J]. PHYSICAL REVIEW A, 2014, 89 (02):
  • [7] Nonorthogonal decoy-state quantum key distribution
    Li, JB
    Fang, XM
    [J]. CHINESE PHYSICS LETTERS, 2006, 23 (04) : 775 - 778
  • [8] Practical decoy-state BB84 quantum key distribution with quantum memory
    李咸柯
    宋小谦
    郭其伟
    周星宇
    王琴
    [J]. Chinese Physics B, 2021, 30 (06) : 77 - 80
  • [9] Practical decoy-state BB84 quantum key distribution with quantum memory*
    Li, Xian-Ke
    Song, Xiao-Qian
    Guo, Qi-Wei
    Zhou, Xing-Yu
    Wang, Qin
    [J]. CHINESE PHYSICS B, 2021, 30 (06)
  • [10] Practical decoy-state method for twin-field quantum key distribution
    Grasselli, Federico
    Curty, Marcos
    [J]. NEW JOURNAL OF PHYSICS, 2019, 21 (07)