Improved key-rate bounds for practical decoy-state quantum-key-distribution systems

被引:97
|
作者
Zhang, Zhen [1 ]
Zhao, Qi [1 ]
Razavi, Mohsen [2 ]
Ma, Xiongfeng [1 ]
机构
[1] Tsinghua Univ, Inst Interdisciplinary Informat Sci, Ctr Quantum Informat, Beijing 100084, Peoples R China
[2] Univ Leeds, Sch Elect & Elect Engn, Leeds LS2 9JT, W Yorkshire, England
基金
中国国家自然科学基金; 英国工程与自然科学研究理事会;
关键词
UNCONDITIONAL SECURITY; CRYPTOGRAPHY; PROOF;
D O I
10.1103/PhysRevA.95.012333
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
The decoy-state scheme is the most widely implemented quantum-key-distribution protocol in practice. In order to account for the finite-size key effects on the achievable secret key generation rate, a rigorous statistical fluctuation analysis is required. Originally, a heuristic Gaussian-approximation technique was used for this purpose, which, despite its analytical convenience, was not sufficiently rigorous. The fluctuation analysis has recently been made rigorous by using the Chernoff bound. There is a considerable gap, however, between the key-rate bounds obtained from these techniques and that obtained from the Gaussian assumption. Here we develop a tighter bound for the decoy-state method, which yields a smaller failure probability. This improvement results in a higher key rate and increases the maximum distance over which secure key exchange is possible. By optimizing the system parameters, our simulation results show that our method almost closes the gap between the two previously proposed techniques and achieves a performance similar to that of conventional Gaussian approximations.
引用
收藏
页数:14
相关论文
共 50 条
  • [31] Practical decoy state for quantum key distribution
    Ma, XF
    Qi, B
    Zhao, Y
    Lo, HK
    [J]. PHYSICAL REVIEW A, 2005, 72 (01)
  • [32] Practical high-speed light source for decoy-state quantum key distribution
    杜海彬
    梁焰
    张盛祥
    陈修亮
    赵林
    陈杰
    曾和平
    [J]. Chinese Optics Letters, 2014, 12 (07) : 71 - 74
  • [33] Improving the performance of practical decoy-state quantum key distribution with advantage distillation technology
    Hong-Wei Li
    Chun-Mei Zhang
    Mu-Sheng Jiang
    Qing-Yu Cai
    [J]. Communications Physics, 5
  • [34] Practical issues in decoy-state quantum key distribution based on the central limit theorem
    Trushechkin, A. S.
    Kiktenko, E. O.
    Fedorov, A. K.
    [J]. PHYSICAL REVIEW A, 2017, 96 (02)
  • [35] Efficient decoy-state quantum key distribution with quantified security
    Lucamarini, M.
    Patel, K. A.
    Dynes, J. F.
    Froehlich, B.
    Sharpe, A. W.
    Dixon, A. R.
    Yuan, Z. L.
    Penty, R. V.
    Shields, A. J.
    [J]. OPTICS EXPRESS, 2013, 21 (21): : 24550 - 24565
  • [36] Free-space decoy-state quantum key distribution
    Fuerst, M.
    Schmitt-Manderbach, T.
    Weier, H.
    Ursin, R.
    Tiefenbacher, F.
    Scheidl, T.
    Barbieri, C.
    Perdigues, J.
    Sodnik, Z.
    Kurtsiefer, C.
    Rarity, J. G.
    Zeilinger, A.
    Weinfurter, H.
    [J]. 2008 CONFERENCE ON OPTICAL FIBER COMMUNICATION/NATIONAL FIBER OPTIC ENGINEERS CONFERENCE, VOLS 1-8, 2008, : 2765 - 2767
  • [37] Reexamination of decoy-state quantum key distribution with biased bases
    Yu, Zong-Wen
    Zhou, Yi-Heng
    Wang, Xiang-Bin
    [J]. PHYSICAL REVIEW A, 2016, 93 (03)
  • [38] Passive Decoy-State Quantum Key Distribution with Coherent Light
    Curty, Marcos
    Jofre, Marc
    Pruneri, Valerio
    Mitchell, Morgan W.
    [J]. ENTROPY, 2015, 17 (06) : 4064 - 4082
  • [39] Decoy-state quantum key distribution with biased basis choice
    Zhengchao Wei
    Weilong Wang
    Zhen Zhang
    Ming Gao
    Zhi Ma
    Xiongfeng Ma
    [J]. Scientific Reports, 3
  • [40] Decoy-state quantum key distribution with biased basis choice
    Wei, Zhengchao
    Wang, Weilong
    Zhang, Zhen
    Gao, Ming
    Ma, Zhi
    Ma, Xiongfeng
    [J]. SCIENTIFIC REPORTS, 2013, 3