中国物理B ›› 2023, Vol. 32 ›› Issue (3): 30307-030307.doi: 10.1088/1674-1056/ac9b33

• • 上一篇    下一篇

Security of the traditional quantum key distribution protocols with finite-key lengths

Bao Feng(冯宝)1,2, Hai-Dong Huang(黄海东)3, Yu-Xiang Bian(卞宇翔)1,2, Wei Jia(贾玮)1,2, Xing-Yu Zhou(周星宇)4,†, and Qin Wang(王琴)4   

  1. 1 State Grid Electric Power Research Institute, Nanjing 211000, China;
    2 NRGD Quantum CTEK Co., Ltd., Nanjing 211000, China;
    3 State Grid Jiangsu Electric Power Co., Ltd., Nanjing 210000, China;
    4 Institute of Quantum Information and Technology, Nanjing University of Posts and Telecommunications, Nanjing 210003, China
  • 收稿日期:2022-07-19 修回日期:2022-09-29 接受日期:2022-10-19 出版日期:2023-02-14 发布日期:2023-03-03
  • 通讯作者: Xing-Yu Zhou E-mail:xyz@njupt.edu.cn
  • 基金资助:
    Project supported by the Research on Key Technology and Equipment Development of Autonomous and Controllable Lightweight Endogenous Safety of Power Monitoring System (Grant No. 5108-202118056A-0-0-00).

Security of the traditional quantum key distribution protocols with finite-key lengths

Bao Feng(冯宝)1,2, Hai-Dong Huang(黄海东)3, Yu-Xiang Bian(卞宇翔)1,2, Wei Jia(贾玮)1,2, Xing-Yu Zhou(周星宇)4,†, and Qin Wang(王琴)4   

  1. 1 State Grid Electric Power Research Institute, Nanjing 211000, China;
    2 NRGD Quantum CTEK Co., Ltd., Nanjing 211000, China;
    3 State Grid Jiangsu Electric Power Co., Ltd., Nanjing 210000, China;
    4 Institute of Quantum Information and Technology, Nanjing University of Posts and Telecommunications, Nanjing 210003, China
  • Received:2022-07-19 Revised:2022-09-29 Accepted:2022-10-19 Online:2023-02-14 Published:2023-03-03
  • Contact: Xing-Yu Zhou E-mail:xyz@njupt.edu.cn
  • Supported by:
    Project supported by the Research on Key Technology and Equipment Development of Autonomous and Controllable Lightweight Endogenous Safety of Power Monitoring System (Grant No. 5108-202118056A-0-0-00).

摘要: Quantum key distribution (QKD) in principle can provide unconditional secure communication between distant parts. However, when finite-key length is taken into account, the security can only be ensured within certain security level. In this paper, we adopt the Chernoff bound analysis method to deal with finite-key-size effects, carrying out corresponding investigations on the relationship between the key generation rate and security parameters for different protocols, including BB84, measurement-device-independent and twin-field QKD protocols. Simulation results show that there exists a fundamental limit between the key rate and the security parameters. Therefore, this study can provide valuable references for practical application of QKD, getting a nice balance between the key generation rate and the security level.

关键词: quantum key distribution, BB84, measurement-device-independent quantum key distribution, twin-field quantum key distribution

Abstract: Quantum key distribution (QKD) in principle can provide unconditional secure communication between distant parts. However, when finite-key length is taken into account, the security can only be ensured within certain security level. In this paper, we adopt the Chernoff bound analysis method to deal with finite-key-size effects, carrying out corresponding investigations on the relationship between the key generation rate and security parameters for different protocols, including BB84, measurement-device-independent and twin-field QKD protocols. Simulation results show that there exists a fundamental limit between the key rate and the security parameters. Therefore, this study can provide valuable references for practical application of QKD, getting a nice balance between the key generation rate and the security level.

Key words: quantum key distribution, BB84, measurement-device-independent quantum key distribution, twin-field quantum key distribution

中图分类号:  (Quantum cryptography and communication security)

  • 03.67.Dd
03.67.Hk (Quantum communication) 42.65.Lm (Parametric down conversion and production of entangled photons)