Sifting problems in finite-size quantum key distribution Extended Abstract

نویسندگان

  • Corsin Pfister
  • Patrick J. Coles
  • Stephanie Wehner
  • Norbert Lütkenhaus
چکیده

Quantum key distribution (QKD) allows for unconditionally secure communication between two parties (Alice and Bob). A recent breakthrough in the theory of QKD is the treatment of finite-key scenarios, pioneered by Renner and collaborators (see [1], for example). This has made QKD theory practically relevant, since the asymptotic regime associated with infinitely many exchanged quantum signals is often an insu cient description of actual experiments. In practice, Alice and Bob have limited time and/or dim light sources that limit the number of photons they can exchange. For example, in satellitebased QKD where, say, Bob is on the satellite and Alice is on the ground, the time allotted for exchanging quantum signals corresponds to the time for the satellite to pass overhead Alice’s laboratory on the ground. Finite-key analysis attempts to rigorously establish the security of finite-size keys extracted from finite raw data. A systematic framework for such analysis was developed by Tomamichel et al. [2] involving the smooth entropy formalism. This framework was later extended to a decoy-state protocol by Lim et al. [3]. An alternative framework was developed by Hayashi and collaborators [4, 5]. Other extensions of the finite-key framework include the treatment of device-independent protocols by Curty et al. [6] and Lim et al. [7], and continuous-variable protocols by Furrer et al. [8] and Leverrier [9]. The framework used in the aforementioned works, relying on some fairly technical results,1 represents the current state-ofthe-art in the level of mathematical rigor for QKD security proofs. These theoretical advances have led to experimental implementations with finite-key analysis. Some examples of such experiments include Refs. [10–12]. One can argue that all real QKD implementations are of finite size. It is therefore of utmost importance to fully understand the subtleties of finite-size e↵ects. We point out that this understanding is required not only for theoretical satisfaction but also for the correct calculation of practically relevant quantities such as the key rate or the noise tolerance of a QKD protocol.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Custom Hardware to Eliminate Bottlenecks in QKD Throughput Performance

The National Institute of Standards and Technology (NIST) high-speed quantum key distribution (QKD) system was designed to include custom hardware to support the generation and management of gigabit data streams. As our photonics improved our software sifting algorithm couldn’t keep up with the amount of data generated. To eliminate this problem we implemented the sifting algorithm into our pro...

متن کامل

Photon-Number-Splitting-attack resistant Quantum Key Distribution Protocols without sifting

HAL is a multi-disciplinary open access archive for the deposit and dissemination of scientific research documents, whether they are published or not. The documents may come from teaching and research institutions in France or abroad, or from public or private research centers. L’archive ouverte pluridisciplinaire HAL, est destinée au dépôt et à la diffusion de documents scientifiques de niveau...

متن کامل

Post-processing procedure for industrial quantum key distribution systems

We present algorithmic solutions aimed on post-processing for industrial quantum key distribution systems with hardware sifting. The main steps of the procedure are error correction, parameter estimation, and privacy amplification. Authentication of a classical public communication channel is also considered.

متن کامل

Finite Key Size Analysis of Two-Way Quantum Cryptography

Quantum cryptographic protocols solve the longstanding problem of distributing a shared secret string to two distant users by typically making use of one-way quantum channel. However, alternative protocols exploiting two-way quantum channel have been proposed for the same goal and with potential advantages. Here, we overview a security proof for two-way quantum key distribution protocols, again...

متن کامل

Finite-key analysis of high-dimensional time-energy entanglement-based quantum key distribution

We present a security analysis against collective attacks for a time-energy entanglement-based quantum key distribution protocol, given the practical constraints of single photon detector efficiency, channel loss, and finite-key considerations. We find a positive secure-key capacity when the key length increases beyond 104 for eight-dimensional systems. The minimum key length required is reduce...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015