中国物理B ›› 2014, Vol. 23 ›› Issue (10): 100304-100304.doi: 10.1088/1674-1056/23/10/100304

• GENERAL • 上一篇    下一篇

Security of biased BB84 quantum key distribution with finite resource

赵良圆a b, 李宏伟a b c, 银振强a b, 陈巍a b, 尤娟a, 韩正甫a b   

  1. a Key Laboratory of Quantum Information, University of Science and Technology of China, Hefei 230026, China;
    b Synergetic Innovation Center of Quantum Information & Quantum Physics, University of Science and Technology of China, Hefei 230026, China;
    c Zhengzhou Information Science and Technology Institute, Zhengzhou 450004, China
  • 收稿日期:2014-04-17 修回日期:2014-07-03 出版日期:2014-10-15 发布日期:2014-10-15
  • 基金资助:
    Project supported by the the National Natural Science Foundation of China (Grant Nos. 61101137, 61201239, 61205118, and 11304397) and the China Postdoctoral Science Foundation. (Grant No. 2013M540514).

Security of biased BB84 quantum key distribution with finite resource

Zhao Liang-Yuan (赵良圆)a b, Li Hong-Wei (李宏伟)a b c, Yin Zhen-Qiang (银振强)a b, Chen Wei (陈巍)a b, You Juan (尤娟)a, Han Zheng-Fu (韩正甫)a b   

  1. a Key Laboratory of Quantum Information, University of Science and Technology of China, Hefei 230026, China;
    b Synergetic Innovation Center of Quantum Information & Quantum Physics, University of Science and Technology of China, Hefei 230026, China;
    c Zhengzhou Information Science and Technology Institute, Zhengzhou 450004, China
  • Received:2014-04-17 Revised:2014-07-03 Online:2014-10-15 Published:2014-10-15
  • Contact: Li Hong-Wei,Yin Zhen-Qiang E-mail:lihw@mail.ustc.edu.cn;yinzheqi@mail.ustc.edu.cn
  • About author:03.67.Dd
  • Supported by:
    Project supported by the the National Natural Science Foundation of China (Grant Nos. 61101137, 61201239, 61205118, and 11304397) and the China Postdoctoral Science Foundation. (Grant No. 2013M540514).

摘要: In the original BB84 quantum key distribution protocol, the states are prepared and measured randomly, which lose the unmatched detection results. To improve the sifting efficiency, biased bases selection BB84 protocol is proposed. Meanwhile, a practical quantum key distribution protocol can only transmit a finite number of signals, resulting in keys of finite length. The previous techniques for finite-key analysis focus mainly on the statistical fluctuations of the error rates and yields of the qubits. However, the prior choice probabilities of the two bases also have fluctuations by taking into account the finite-size effect. In this paper, we discuss the security of biased decoy state BB84 protocol with finite resources by considering all of the statistical fluctuations. The results can be directly used in the experimental realizations.

关键词: biased basis selection, security bound, quantum key distribution

Abstract: In the original BB84 quantum key distribution protocol, the states are prepared and measured randomly, which lose the unmatched detection results. To improve the sifting efficiency, biased bases selection BB84 protocol is proposed. Meanwhile, a practical quantum key distribution protocol can only transmit a finite number of signals, resulting in keys of finite length. The previous techniques for finite-key analysis focus mainly on the statistical fluctuations of the error rates and yields of the qubits. However, the prior choice probabilities of the two bases also have fluctuations by taking into account the finite-size effect. In this paper, we discuss the security of biased decoy state BB84 protocol with finite resources by considering all of the statistical fluctuations. The results can be directly used in the experimental realizations.

Key words: biased basis selection, security bound, quantum key distribution

中图分类号:  (Quantum cryptography and communication security)

  • 03.67.Dd