Concise security bounds for practical decoy-state quantum key distribution

被引:260
|
作者
Lim, Charles Ci Wen [1 ]
Curty, Marcos [2 ]
Walenta, Nino [1 ]
Xu, Feihu [3 ,4 ]
Zbinden, Hugo [1 ]
机构
[1] Univ Geneva, Appl Phys Grp, CH-1211 Geneva 4, Switzerland
[2] Univ Vigo, Dept Signal Theory & Commun, EI Telecomunicac, Vigo, Spain
[3] Univ Toronto, Dept Phys, Ctr Quantum Informat & Quantum Control, Toronto, ON M5S 1A1, Canada
[4] Univ Toronto, Dept Elect & Comp Engn, Toronto, ON M5S 1A1, Canada
来源
PHYSICAL REVIEW A | 2014年 / 89卷 / 02期
基金
加拿大自然科学与工程研究理事会;
关键词
CRYPTOGRAPHY; NETWORK;
D O I
10.1103/PhysRevA.89.022307
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
Due to its ability to tolerate high channel loss, decoy-state quantum key distribution (QKD) has been one of the main focuses within the QKD community. Notably, several experimental groups have demonstrated that it is secure and feasible under real-world conditions. Crucially, however, the security and feasibility claims made by most of these experiments were obtained under the assumption that the eavesdropper is restricted to particular types of attacks or that the finite-key effects are neglected. Unfortunately, such assumptions are not possible to guarantee in practice. In this work, we provide concise and tight finite-key security bounds for practical decoy-state QKD that are valid against general attacks.
引用
收藏
页数:7
相关论文
共 50 条
  • [1] Tight security bounds for decoy-state quantum key distribution
    Hua-Lei Yin
    Min-Gang Zhou
    Jie Gu
    Yuan-Mei Xie
    Yu-Shuo Lu
    Zeng-Bing Chen
    [J]. Scientific Reports, 10
  • [2] Security Bounds for Efficient Decoy-State Quantum Key Distribution
    Lucamarini, Marco
    Dynes, James F.
    Froehlich, Bernd
    Yuan, Zhiliang
    Shields, Andrew J.
    [J]. IEEE JOURNAL OF SELECTED TOPICS IN QUANTUM ELECTRONICS, 2015, 21 (03) : 1 - 8
  • [3] Tight security bounds for decoy-state quantum key distribution
    Yin, Hua-Lei
    Zhou, Min-Gang
    Gu, Jie
    Xie, Yuan-Mei
    Lu, Yu-Shuo
    Chen, Zeng-Bing
    [J]. SCIENTIFIC REPORTS, 2020, 10 (01)
  • [4] Practical security of wavelength-multiplexed decoy-state quantum key distribution
    Zhao, Liang-Yuan
    Wu, Qian-Jun
    Qiu, Hong-Kang
    Qian, Jian-Lin
    Han, Zheng-Fu
    [J]. PHYSICAL REVIEW A, 2021, 103 (02)
  • [5] Practical covert quantum key distribution with decoy-state method
    Fen-Zhuo Guo
    Li Liu
    An-Kang Wang
    Qiao-Yan Wen
    [J]. Quantum Information Processing, 2019, 18
  • [6] Improved key-rate bounds for practical decoy-state quantum-key-distribution systems
    Zhang, Zhen
    Zhao, Qi
    Razavi, Mohsen
    Ma, Xiongfeng
    [J]. PHYSICAL REVIEW A, 2017, 95 (01)
  • [7] Decoy-state quantum key distribution with practical light source
    Jiao Rong-Zhen
    Zhang Chao
    Ma Hai-Qiang
    [J]. ACTA PHYSICA SINICA, 2011, 60 (11)
  • [8] Efficient decoy-state quantum key distribution with quantified security
    Lucamarini, M.
    Patel, K. A.
    Dynes, J. F.
    Froehlich, B.
    Sharpe, A. W.
    Dixon, A. R.
    Yuan, Z. L.
    Penty, R. V.
    Shields, A. J.
    [J]. OPTICS EXPRESS, 2013, 21 (21): : 24550 - 24565
  • [9] Security bounds for decoy-state quantum key distribution with arbitrary photon-number statistics
    Foletto, Giulio
    Picciariello, Francesco
    Agnesi, Costantino
    Villoresi, Paolo
    Vallone, Giuseppe
    [J]. PHYSICAL REVIEW A, 2022, 105 (01)
  • [10] Practical covert quantum key distribution with decoy-state method
    Guo, Fen-Zhuo
    Liu, Li
    Wang, An-Kang
    Wen, Qiao-Yan
    [J]. QUANTUM INFORMATION PROCESSING, 2019, 18 (04)