Improved key-rate bounds for practical decoy-state quantum-key-distribution systems

被引:97
|
作者
Zhang, Zhen [1 ]
Zhao, Qi [1 ]
Razavi, Mohsen [2 ]
Ma, Xiongfeng [1 ]
机构
[1] Tsinghua Univ, Inst Interdisciplinary Informat Sci, Ctr Quantum Informat, Beijing 100084, Peoples R China
[2] Univ Leeds, Sch Elect & Elect Engn, Leeds LS2 9JT, W Yorkshire, England
基金
中国国家自然科学基金; 英国工程与自然科学研究理事会;
关键词
UNCONDITIONAL SECURITY; CRYPTOGRAPHY; PROOF;
D O I
10.1103/PhysRevA.95.012333
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
The decoy-state scheme is the most widely implemented quantum-key-distribution protocol in practice. In order to account for the finite-size key effects on the achievable secret key generation rate, a rigorous statistical fluctuation analysis is required. Originally, a heuristic Gaussian-approximation technique was used for this purpose, which, despite its analytical convenience, was not sufficiently rigorous. The fluctuation analysis has recently been made rigorous by using the Chernoff bound. There is a considerable gap, however, between the key-rate bounds obtained from these techniques and that obtained from the Gaussian assumption. Here we develop a tighter bound for the decoy-state method, which yields a smaller failure probability. This improvement results in a higher key rate and increases the maximum distance over which secure key exchange is possible. By optimizing the system parameters, our simulation results show that our method almost closes the gap between the two previously proposed techniques and achieves a performance similar to that of conventional Gaussian approximations.
引用
收藏
页数:14
相关论文
共 50 条
  • [1] Practical attacks on decoy-state quantum-key-distribution systems with detector efficiency mismatch
    Fei, Yangyang
    Gao, Ming
    Wang, Weilong
    Li, Chaobo
    Ma, Zhi
    [J]. PHYSICAL REVIEW A, 2015, 91 (05):
  • [2] Upper bounds for the secure key rate of the decoy-state quantum key distribution
    Curty, Marcos
    Moroder, Tobias
    Ma, Xiongfeng
    Lo, Hoi-Kwong
    Luetkenhaus, Norbert
    [J]. PHYSICAL REVIEW A, 2009, 79 (03):
  • [3] Concise security bounds for practical decoy-state quantum key distribution
    Lim, Charles Ci Wen
    Curty, Marcos
    Walenta, Nino
    Xu, Feihu
    Zbinden, Hugo
    [J]. PHYSICAL REVIEW A, 2014, 89 (02):
  • [4] Optimizing Decoy-State Protocols for Practical Quantum Key Distribution Systems
    Fan-Yuan, Guan-Jie
    Wang, Ze-Hao
    Wang, Shuang
    Yin, Zhen-Qiang
    Chen, Wei
    He, De-Yong
    Guo, Guang-Can
    Han, Zheng-Fu
    [J]. ADVANCED QUANTUM TECHNOLOGIES, 2021, 4 (04)
  • [5] Tight security bounds for decoy-state quantum key distribution
    Hua-Lei Yin
    Min-Gang Zhou
    Jie Gu
    Yuan-Mei Xie
    Yu-Shuo Lu
    Zeng-Bing Chen
    [J]. Scientific Reports, 10
  • [6] Security Bounds for Efficient Decoy-State Quantum Key Distribution
    Lucamarini, Marco
    Dynes, James F.
    Froehlich, Bernd
    Yuan, Zhiliang
    Shields, Andrew J.
    [J]. IEEE JOURNAL OF SELECTED TOPICS IN QUANTUM ELECTRONICS, 2015, 21 (03) : 1 - 8
  • [7] Tight security bounds for decoy-state quantum key distribution
    Yin, Hua-Lei
    Zhou, Min-Gang
    Gu, Jie
    Xie, Yuan-Mei
    Lu, Yu-Shuo
    Chen, Zeng-Bing
    [J]. SCIENTIFIC REPORTS, 2020, 10 (01)
  • [8] Practical covert quantum key distribution with decoy-state method
    Fen-Zhuo Guo
    Li Liu
    An-Kang Wang
    Qiao-Yan Wen
    [J]. Quantum Information Processing, 2019, 18
  • [9] Decoy-state quantum key distribution with practical light source
    Jiao Rong-Zhen
    Zhang Chao
    Ma Hai-Qiang
    [J]. ACTA PHYSICA SINICA, 2011, 60 (11)
  • [10] Practical covert quantum key distribution with decoy-state method
    Guo, Fen-Zhuo
    Liu, Li
    Wang, An-Kang
    Wen, Qiao-Yan
    [J]. QUANTUM INFORMATION PROCESSING, 2019, 18 (04)