Cargando…

Tight security bounds for decoy-state quantum key distribution

The BB84 quantum key distribution (QKD) combined with decoy-state method is currently the most practical protocol, which has been proved secure against general attacks in the finite-key regime. Thereinto, statistical fluctuation analysis methods are very important in dealing with finite-key effects,...

Descripción completa

Detalles Bibliográficos
Autores principales: Yin, Hua-Lei, Zhou, Min-Gang, Gu, Jie, Xie, Yuan-Mei, Lu, Yu-Shuo, Chen, Zeng-Bing
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Nature Publishing Group UK 2020
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7458928/
https://www.ncbi.nlm.nih.gov/pubmed/32868774
http://dx.doi.org/10.1038/s41598-020-71107-6
_version_ 1783576294301106176
author Yin, Hua-Lei
Zhou, Min-Gang
Gu, Jie
Xie, Yuan-Mei
Lu, Yu-Shuo
Chen, Zeng-Bing
author_facet Yin, Hua-Lei
Zhou, Min-Gang
Gu, Jie
Xie, Yuan-Mei
Lu, Yu-Shuo
Chen, Zeng-Bing
author_sort Yin, Hua-Lei
collection PubMed
description The BB84 quantum key distribution (QKD) combined with decoy-state method is currently the most practical protocol, which has been proved secure against general attacks in the finite-key regime. Thereinto, statistical fluctuation analysis methods are very important in dealing with finite-key effects, which directly affect secret key rate, secure transmission distance and most importantly, the security. There are two tasks of statistical fluctuation in decoy-state BB84 QKD. One is the deviation between expected value and observed value for a given expected value or observed value. The other is the deviation between phase error rate of computational basis and bit error rate of dual basis. Here, we provide the rigorous and optimal analytic formula to solve the above tasks, resulting to higher secret key rate and longer secure transmission distance. Our results can be widely applied to deal with statistical fluctuation in quantum cryptography protocols.
format Online
Article
Text
id pubmed-7458928
institution National Center for Biotechnology Information
language English
publishDate 2020
publisher Nature Publishing Group UK
record_format MEDLINE/PubMed
spelling pubmed-74589282020-09-01 Tight security bounds for decoy-state quantum key distribution Yin, Hua-Lei Zhou, Min-Gang Gu, Jie Xie, Yuan-Mei Lu, Yu-Shuo Chen, Zeng-Bing Sci Rep Article The BB84 quantum key distribution (QKD) combined with decoy-state method is currently the most practical protocol, which has been proved secure against general attacks in the finite-key regime. Thereinto, statistical fluctuation analysis methods are very important in dealing with finite-key effects, which directly affect secret key rate, secure transmission distance and most importantly, the security. There are two tasks of statistical fluctuation in decoy-state BB84 QKD. One is the deviation between expected value and observed value for a given expected value or observed value. The other is the deviation between phase error rate of computational basis and bit error rate of dual basis. Here, we provide the rigorous and optimal analytic formula to solve the above tasks, resulting to higher secret key rate and longer secure transmission distance. Our results can be widely applied to deal with statistical fluctuation in quantum cryptography protocols. Nature Publishing Group UK 2020-08-31 /pmc/articles/PMC7458928/ /pubmed/32868774 http://dx.doi.org/10.1038/s41598-020-71107-6 Text en © The Author(s) 2020 Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/.
spellingShingle Article
Yin, Hua-Lei
Zhou, Min-Gang
Gu, Jie
Xie, Yuan-Mei
Lu, Yu-Shuo
Chen, Zeng-Bing
Tight security bounds for decoy-state quantum key distribution
title Tight security bounds for decoy-state quantum key distribution
title_full Tight security bounds for decoy-state quantum key distribution
title_fullStr Tight security bounds for decoy-state quantum key distribution
title_full_unstemmed Tight security bounds for decoy-state quantum key distribution
title_short Tight security bounds for decoy-state quantum key distribution
title_sort tight security bounds for decoy-state quantum key distribution
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7458928/
https://www.ncbi.nlm.nih.gov/pubmed/32868774
http://dx.doi.org/10.1038/s41598-020-71107-6
work_keys_str_mv AT yinhualei tightsecurityboundsfordecoystatequantumkeydistribution
AT zhoumingang tightsecurityboundsfordecoystatequantumkeydistribution
AT gujie tightsecurityboundsfordecoystatequantumkeydistribution
AT xieyuanmei tightsecurityboundsfordecoystatequantumkeydistribution
AT luyushuo tightsecurityboundsfordecoystatequantumkeydistribution
AT chenzengbing tightsecurityboundsfordecoystatequantumkeydistribution