Quantum key distribution with finite resources: Secret key rates via Renyi entropies

被引:11
|
作者
Abruzzo, Silvestre [1 ]
Kampermann, Hermann [1 ]
Mertz, Markus [1 ]
Bruss, Dagmar [1 ]
机构
[1] Univ Dusseldorf, Inst Theoret Phys 3, D-40225 Dusseldorf, Germany
来源
PHYSICAL REVIEW A | 2011年 / 84卷 / 03期
关键词
UNCONDITIONAL SECURITY; PROOF;
D O I
10.1103/PhysRevA.84.032321
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
A realistic quantum key distribution (QKD) protocol necessarily deals with finite resources, such as the number of signals exchanged by the two parties. We derive a bound on the secret key rate which is expressed as an optimization problem over Renyi entropies. Under the assumption of collective attacks by an eavesdropper, a computable estimate of our bound for the six-state protocol is provided. This bound leads to improved key rates in comparison to previous results.
引用
收藏
页数:10
相关论文
共 50 条
  • [1] Finite-size key in the Bennett 1992 quantum-key-distribution protocol for Renyi entropies
    Mafu, Mhlambululi
    Garapo, Kevin
    Petruccione, Francesco
    PHYSICAL REVIEW A, 2013, 88 (06):
  • [2] Quantum repeaters and quantum key distribution: Analysis of secret-key rates
    Abruzzo, Silvestre
    Bratzik, Sylvia
    Bernardes, Nadja K.
    Kampermann, Hermann
    van Loock, Peter
    Bruss, Dagmar
    PHYSICAL REVIEW A, 2013, 87 (05)
  • [3] Finite-size key in QKD protocols for Renyi entropies
    Mafu, Mhlambululi
    Garapo, Kevin
    Petruccione, Francesco
    PROCEEDINGS OF SAIP2013: THE 58TH ANNUAL CONFERENCE OF THE SOUTH AFRICAN INSTITUTE OF PHYSICS, 2013, : 548 - 553
  • [4] Mapping Guaranteed Positive Secret Key Rates for Continuous Variable Quantum Key Distribution
    Sayat, Mikhael T.
    Thearle, Oliver
    Shajilal, Biveen
    Kish, Sebastian P.
    Lam, Ping Koy
    Rattenbury, Nicholas J.
    Cater, John E.
    ENTROPY, 2024, 26 (10)
  • [5] Eavesdropping on counterfactual quantum key distribution with finite resources
    Liu, Xingtong
    Zhang, Bo
    Wang, Jian
    Tang, Chaojing
    Zhao, Jingjing
    Zhang, Sheng
    PHYSICAL REVIEW A, 2014, 90 (02):
  • [6] Decoy state quantum key distribution with finite resources
    Sun, Shi-Hai
    Liang, Lin-Mei
    Li, Cheng-Zu
    PHYSICS LETTERS A, 2009, 373 (30) : 2533 - 2536
  • [7] Key-leakage evaluation of authentication in quantum key distribution with finite resources
    Zhou, Chun
    Bao, Wan-Su
    Li, Hong-Wei
    Wang, Yang
    Fu, Xiang-Qun
    QUANTUM INFORMATION PROCESSING, 2014, 13 (04) : 935 - 955
  • [8] Key-leakage evaluation of authentication in quantum key distribution with finite resources
    Chun Zhou
    Wan-Su Bao
    Hong-Wei Li
    Yang Wang
    Xiang-Qun Fu
    Quantum Information Processing, 2014, 13 : 935 - 955
  • [9] Quantum key distribution and secret sharing via W states
    School of Science, Beijing University of Posts and Telecommunications, Beijing 100876, China
    不详
    Beijing Youdian Daxue Xuebao, 2006, 3 (40-43+52):
  • [10] Quantum key distribution with finite resources: Taking advantage of quantum noise
    Mertz, Markus
    Kampermann, Hermann
    Shadman, Zahra
    Bruss, Dagmar
    PHYSICAL REVIEW A, 2013, 87 (04):