|
|
Security of the traditional quantum key distribution protocols with finite-key lengths |
Bao Feng(冯宝)1,2, Hai-Dong Huang(黄海东)3, Yu-Xiang Bian(卞宇翔)1,2, Wei Jia(贾玮)1,2, Xing-Yu Zhou(周星宇)4,†, and Qin Wang(王琴)4 |
1 State Grid Electric Power Research Institute, Nanjing 211000, China; 2 NRGD Quantum CTEK Co., Ltd., Nanjing 211000, China; 3 State Grid Jiangsu Electric Power Co., Ltd., Nanjing 210000, China; 4 Institute of Quantum Information and Technology, Nanjing University of Posts and Telecommunications, Nanjing 210003, China |
|
|
Abstract Quantum key distribution (QKD) in principle can provide unconditional secure communication between distant parts. However, when finite-key length is taken into account, the security can only be ensured within certain security level. In this paper, we adopt the Chernoff bound analysis method to deal with finite-key-size effects, carrying out corresponding investigations on the relationship between the key generation rate and security parameters for different protocols, including BB84, measurement-device-independent and twin-field QKD protocols. Simulation results show that there exists a fundamental limit between the key rate and the security parameters. Therefore, this study can provide valuable references for practical application of QKD, getting a nice balance between the key generation rate and the security level.
|
Received: 19 July 2022
Revised: 29 September 2022
Accepted manuscript online: 19 October 2022
|
PACS:
|
03.67.Dd
|
(Quantum cryptography and communication security)
|
|
03.67.Hk
|
(Quantum communication)
|
|
42.65.Lm
|
(Parametric down conversion and production of entangled photons)
|
|
Fund: Project supported by the Research on Key Technology and Equipment Development of Autonomous and Controllable Lightweight Endogenous Safety of Power Monitoring System (Grant No. 5108-202118056A-0-0-00). |
Corresponding Authors:
Xing-Yu Zhou
E-mail: xyz@njupt.edu.cn
|
Cite this article:
Bao Feng(冯宝), Hai-Dong Huang(黄海东), Yu-Xiang Bian(卞宇翔), Wei Jia(贾玮), Xing-Yu Zhou(周星宇), and Qin Wang(王琴) Security of the traditional quantum key distribution protocols with finite-key lengths 2023 Chin. Phys. B 32 030307
|
[1] Bennett C H and Brassard G 1984 Proceedings of IEEE International Conference on Computers, Systems, and Signal Processing, 1984, New York, pp. 175-179 [2] Lo H K and Chau H F 1999 Science 283 2050 [3] Shor P W and Preskill J 2000 Phys. Rev. Lett. 85 441 [4] Mayers D and Assoc J 2001 Comput. Mach. 48 351 [5] Hwang W Y 2003 Phys. Rev. Lett. 91 057901 [6] Wang X B 2005 Phys. Rev. Lett. 94 230503 [7] Lo H K, Ma X and Chen K 2005 Phys. Rev. Lett. 94 230504 [8] Braunstein S L and Pirandola S 2012 Phys. Rev. Lett. 108 130502 [9] Lo H K, Curty M and Qi B 2012 Phys. Rev. Lett. 108 130503 [10] Lucamarini M, Yuan Z L, Dynes J F and Shields A J 2018 Nature 557 400 [11] Ma X F, Zeng P and Zhou H Y 2018 Phys. Rev. X 8 031043 [12] Wang X B, Yu Z W and Hu X L 2018 Phys. Rev. A 98 062323 [13] Ma X, Fung C H F and Razavi M 2012 Phys. Rev. A 86 052305 [14] Lim C C W, Curty M, Walenta N, Xu F and Zbinden H 2014 Phys. Rev. A 89 022307 [15] Wang Y, Bao W S, Zhou C, Jiang M S and Li H W 2016 Phys. Rev. A 94 032335 [16] Curty M, Xu F, Cui W, Lim C C W, Tamaki K and Lo H K 2014 Nat. Commun. 5 3732 [17] Li H, Jiang H, Gao M, Ma Z, Ma C and Wang W 2015 Phys. Rev. A 92 062344 [18] Yin H L and Chen Z B 2019 Sci. Rep. 9 17113 [19] Fung C H F, Ma X and Chau H F 2010 Phys. Rev. A 81 012318 [20] Yin H L, Zhou M G and Gu J 2020 Sci. Rep. 10 14312 [21] Yin H L and Fu Y 2019 Sci. Rep. 9 3045 [22] Zhang C H, Zhang C M and Wang Q 2019 Opt. Lett. 44 1468 [23] Zhou X Y, Zhang C H, Zhang C M and Wang Q 2019 Phys. Rev. A 99 062316 [24] Wang X B, Wang J T, Qin J Q, Jiang C and Yu Z W 2020 NPJ Quantum Inform. 6 45 [25] Tomamichel M, Lim C C W, Gisin N and Renner R 2012 Nat. Commun. 3 634 |
No Suggested Reading articles found! |
|
|
Viewed |
|
|
|
Full text
|
|
|
|
|
Abstract
|
|
|
|
|
Cited |
|
|
|
|
Altmetric
|
blogs
Facebook pages
Wikipedia page
Google+ users
|
Online attention
Altmetric calculates a score based on the online attention an article receives. Each coloured thread in the circle represents a different type of online attention. The number in the centre is the Altmetric score. Social media and mainstream news media are the main sources that calculate the score. Reference managers such as Mendeley are also tracked but do not contribute to the score. Older articles often score higher because they have had more time to get noticed. To account for this, Altmetric has included the context data for other articles of a similar age.
View more on Altmetrics
|
|
|