Finite-key analysis of loss-tolerant quantum key distribution based on random sampling theory
نویسندگان
چکیده
The core of security proofs quantum key distribution (QKD) is the estimation a parameter that determines amount privacy amplification users need to apply in order distill secret key. To estimate this using observed data, one needs concentration inequalities such as random sampling theory or Azuma's inequality. latter can be straightforwardly employed wider class QKD protocols, including those do not rely on basis-independent sources loss-tolerant (LT) protocol. However, when applied real-life finite-length experiments, inequality typically results substantially lower secret-key rates. Here we propose an alternative analysis LT protocol against general attacks, for both its prepare-and-measure and measurement-device-independent versions, based theory. Consequently, our proof provides considerably higher rates than previous finite-key This work opens up possibility provide other protocols.
منابع مشابه
Finite-key analysis for practical implementations of quantum key distribution
The lists of bits processed in quantum key distribution are necessarily of finite length. The need for finite-key unconditional security bounds was recognized long ago, but the theoretical tools have become available only very recently. We provide finite-key unconditional security bounds for two practical implementations of the Bennett–Brassard 1984 coding: prepareand-measure implementations wi...
متن کاملFinite-key analysis for measurement-device-independent quantum key distribution.
Quantum key distribution promises unconditionally secure communications. However, as practical devices tend to deviate from their specifications, the security of some practical systems is no longer valid. In particular, an adversary can exploit imperfect detectors to learn a large part of the secret key, even though the security proof claims otherwise. Recently, a practical approach--measuremen...
متن کاملFinite-key analysis of high-dimensional time-energy entanglement-based quantum key distribution
We present a security analysis against collective attacks for a time-energy entanglement-based quantum key distribution protocol, given the practical constraints of single photon detector efficiency, channel loss, and finite-key considerations. We find a positive secure-key capacity when the key length increases beyond 104 for eight-dimensional systems. The minimum key length required is reduce...
متن کاملRandom Key Pre-distribution Scheme Based on Key Updating
A random key pre-distribution scheme based on key updating (RKKU) was proposed, which is effective in wireless sensor networks. Firstly, the base station will randomly distribute some keys, a hash function and some code slices to each node. Furthermore, the RKKU scheme compares with the information of some random key to find the same key, and computes the communication key between two sensor no...
متن کاملMitigating Node Capture Attack in Random Key Distribution Schemes through Key Deletion
Random Key Distribution (RKD) schemes have been widely accepted to enable low-cost secure communications in Wireless Sensor Networks (WSNs). However, efficiency of secure link establishment comes with the risk of compromised communications between benign nodes by adversaries who physically capture sensor nodes. The challenge is to enhance resilience of WSN against node capture, while maintainin...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Physical review
سال: 2021
ISSN: ['0556-2813', '1538-4497', '1089-490X']
DOI: https://doi.org/10.1103/physreva.104.012406