Practical Evaluation of Security for Quantum Key Distribution

نویسنده

  • Masahito Hayashi
چکیده

Masahito Hayashi ∗ EARTO-SORST Quantum Computation and Information Project, JST 5-28-3, Hongo, Bunkyo-ku, Tokyo, 113-0033, Japan Superrobust Computation Project, Information Science and Technology Strategic Core (21st Century COE by MEXT) Graduate School of Information Science and Technology, The University of Tokyo 7-3-1, Hongo, Bunkyo-ku, Tokyo, 113-0033, Japan Abstract Many papers proved the security of quantum key distribution (QKD) system, in the asymptotic framework. The degree of the security has not been discussed in the finite coding-length framework, sufficiently. However, to guarantee any implemented QKD system requires, it is needed to evaluate a protocol with a finite coding-length. For this purpose, we derive a tight upper bound of the eavesdropper’s information. This bound is better than existing bounds. We also obtain the exponential rate of the eavesdropper’s information. Further, we approximate our bound by using the normal distribution.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Randomness determines practical security of BB84 quantum key distribution

Unconditional security of the BB84 quantum key distribution protocol has been proved by exploiting the fundamental laws of quantum mechanics, but the practical quantum key distribution system maybe hacked by considering the imperfect state preparation and measurement respectively. Until now, different attacking schemes have been proposed by utilizing imperfect devices, but the general security ...

متن کامل

Security of practical phase-coding quantum key distribution

Security proof of practical quantum key distribution (QKD) has attracted a lot of attentions in recent years. Most of real-life QKD implementations are based on phase-coding BB84 protocol, which usually uses Unbalanced Mach-Zehnder Interferometer (UMZI) as the information coder and decoder. However, the long arm and short arm of UMZI will introduce different loss in practical experimental reali...

متن کامل

Security of Quantum Cryptography with Realistic Sources

The interest in practical implementations of quantum key distribution (QKD) is steadily growing. However, there is still a need to give a precise security statement which adapts to realistic implementation. In this paper I give the effective key rate we can obtain in a practical setting within the scenario of security against individual attacks by an eavesdropper. It illustrates previous result...

متن کامل

Information geometric security analysis of differential phase-shift quantum key distribution protocol

This paper analyzes the information-theoretical security of the Differential Phase Shift (DPS) Quantum Key Distribution (QKD) protocol, using efficient computational information geometric algorithms. The DPS QKD protocol was introduced for practical reasons, since the earlier QKD schemes were too complicated to implement in practice. The DPS QKD protocol can be an integrated part of current net...

متن کامل

Quantum Erasure Cryptography

The phenomenon of quantum erasure has long intrigued physicists, but has surprisingly found limited practical application. Here, we propose a protocol for quantum key distribution (QKD) based on quantum erasure, promising inherent security against detector attacks. We particularly demonstrate its security against a powerful detector-blinding attack.

متن کامل

Standardization of quantum key distribution and the ETSI standardization initiative ISG-QKD

In recent years, quantum key distribution (QKD) has been the object of intensive research activities and of rapid progress, and it is now developing into a competitive industry with commercial products. Once QKD systems are transferred from the controlled environment of physical laboratories into a realworld environment for practical use, a number of practical security, compatibility and connec...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006