Finite-key analysis for measurement-device-independent quantum key distribution.
نویسندگان
چکیده
Quantum key distribution promises unconditionally secure communications. However, as practical devices tend to deviate from their specifications, the security of some practical systems is no longer valid. In particular, an adversary can exploit imperfect detectors to learn a large part of the secret key, even though the security proof claims otherwise. Recently, a practical approach--measurement-device-independent quantum key distribution--has been proposed to solve this problem. However, so far its security has only been fully proven under the assumption that the legitimate users of the system have unlimited resources. Here we fill this gap and provide a rigorous security proof against general attacks in the finite-key regime. This is obtained by applying large deviation theory, specifically the Chernoff bound, to perform parameter estimation. For the first time we demonstrate the feasibility of long-distance implementations of measurement-device-independent quantum key distribution within a reasonable time frame of signal transmission.
منابع مشابه
Experimental demonstration of polarization encoding measurement-device-independent quantum key distribution.
We demonstrate the first implementation of polarization encoding measurement-device-independent quantum key distribution (MDI-QKD), which is immune to all detector side-channel attacks. Active phase randomization of each individual pulse is implemented to protect against attacks on imperfect sources. By optimizing the parameters in the decoy state protocol, we show that it is feasible to implem...
متن کاملPractical aspects of measurement-device-independent quantum key distribution
A novel protocol, measurement-device-independent quantum key distribution (MDI-QKD), removes all attacks from the detection system, the most vulnerable part in QKD implementations. In this paper, we present an analysis for practical aspects of MDI-QKD. To evaluate its performance, we study various error sources by developing a general system model. We find that MDI-QKD is highly practical and t...
متن کاملLong-distance measurement-device-independent quantum key distribution with coherent-state superpositions.
Measurement-device-independent quantum key distribution (MDI-QKD) with decoy-state method is believed to be securely applied to defeat various hacking attacks in practical quantum key distribution systems. Recently, the coherent-state superpositions (CSS) have emerged as an alternative to single-photon qubits for quantum information processing and metrology. Here, in this Letter, CSS are exploi...
متن کاملDevice-independent quantum key distribution
Quantum key distribution allows two parties connected by a quantum channel to establish a secret key that is unknown to any unauthorized third party. The secrecy of this key is based on the laws of quantum physics. For security, however, it is crucial that the honest parties are able to control their physical devices accurately and completely. The goal of device-independent quantum key distribu...
متن کاملModeling and Studying Measurement Device Independent Quantum Key Distribution Systems
Quantum Key Distribution (QKD) systems generate and distribute shared secure cryptographic keying material; however, real-world QKD systems are built from non-ideal components and processes which can negatively impact their performance and security [1]. Thus, an efficient means for studying these complex systems is warranted – one which minimizes the extensive resources required to build QKD ar...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Nature communications
دوره 5 شماره
صفحات -
تاریخ انتشار 2014