Cargando…
Tight security bounds for decoy-state quantum key distribution
The BB84 quantum key distribution (QKD) combined with decoy-state method is currently the most practical protocol, which has been proved secure against general attacks in the finite-key regime. Thereinto, statistical fluctuation analysis methods are very important in dealing with finite-key effects,...
Autores principales: | , , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Nature Publishing Group UK
2020
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7458928/ https://www.ncbi.nlm.nih.gov/pubmed/32868774 http://dx.doi.org/10.1038/s41598-020-71107-6 |
_version_ | 1783576294301106176 |
---|---|
author | Yin, Hua-Lei Zhou, Min-Gang Gu, Jie Xie, Yuan-Mei Lu, Yu-Shuo Chen, Zeng-Bing |
author_facet | Yin, Hua-Lei Zhou, Min-Gang Gu, Jie Xie, Yuan-Mei Lu, Yu-Shuo Chen, Zeng-Bing |
author_sort | Yin, Hua-Lei |
collection | PubMed |
description | The BB84 quantum key distribution (QKD) combined with decoy-state method is currently the most practical protocol, which has been proved secure against general attacks in the finite-key regime. Thereinto, statistical fluctuation analysis methods are very important in dealing with finite-key effects, which directly affect secret key rate, secure transmission distance and most importantly, the security. There are two tasks of statistical fluctuation in decoy-state BB84 QKD. One is the deviation between expected value and observed value for a given expected value or observed value. The other is the deviation between phase error rate of computational basis and bit error rate of dual basis. Here, we provide the rigorous and optimal analytic formula to solve the above tasks, resulting to higher secret key rate and longer secure transmission distance. Our results can be widely applied to deal with statistical fluctuation in quantum cryptography protocols. |
format | Online Article Text |
id | pubmed-7458928 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2020 |
publisher | Nature Publishing Group UK |
record_format | MEDLINE/PubMed |
spelling | pubmed-74589282020-09-01 Tight security bounds for decoy-state quantum key distribution Yin, Hua-Lei Zhou, Min-Gang Gu, Jie Xie, Yuan-Mei Lu, Yu-Shuo Chen, Zeng-Bing Sci Rep Article The BB84 quantum key distribution (QKD) combined with decoy-state method is currently the most practical protocol, which has been proved secure against general attacks in the finite-key regime. Thereinto, statistical fluctuation analysis methods are very important in dealing with finite-key effects, which directly affect secret key rate, secure transmission distance and most importantly, the security. There are two tasks of statistical fluctuation in decoy-state BB84 QKD. One is the deviation between expected value and observed value for a given expected value or observed value. The other is the deviation between phase error rate of computational basis and bit error rate of dual basis. Here, we provide the rigorous and optimal analytic formula to solve the above tasks, resulting to higher secret key rate and longer secure transmission distance. Our results can be widely applied to deal with statistical fluctuation in quantum cryptography protocols. Nature Publishing Group UK 2020-08-31 /pmc/articles/PMC7458928/ /pubmed/32868774 http://dx.doi.org/10.1038/s41598-020-71107-6 Text en © The Author(s) 2020 Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/. |
spellingShingle | Article Yin, Hua-Lei Zhou, Min-Gang Gu, Jie Xie, Yuan-Mei Lu, Yu-Shuo Chen, Zeng-Bing Tight security bounds for decoy-state quantum key distribution |
title | Tight security bounds for decoy-state quantum key distribution |
title_full | Tight security bounds for decoy-state quantum key distribution |
title_fullStr | Tight security bounds for decoy-state quantum key distribution |
title_full_unstemmed | Tight security bounds for decoy-state quantum key distribution |
title_short | Tight security bounds for decoy-state quantum key distribution |
title_sort | tight security bounds for decoy-state quantum key distribution |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7458928/ https://www.ncbi.nlm.nih.gov/pubmed/32868774 http://dx.doi.org/10.1038/s41598-020-71107-6 |
work_keys_str_mv | AT yinhualei tightsecurityboundsfordecoystatequantumkeydistribution AT zhoumingang tightsecurityboundsfordecoystatequantumkeydistribution AT gujie tightsecurityboundsfordecoystatequantumkeydistribution AT xieyuanmei tightsecurityboundsfordecoystatequantumkeydistribution AT luyushuo tightsecurityboundsfordecoystatequantumkeydistribution AT chenzengbing tightsecurityboundsfordecoystatequantumkeydistribution |