Zigzag approach to higher key rate of sending-or-not-sending twin field quantum key distribution with finite-key effects
Open Access
- 1 May 2020
- journal article
- research article
- Published by IOP Publishing in New Journal of Physics
- Vol. 22 (5), 053048
- https://doi.org/10.1088/1367-2630/ab81b7
Abstract
Odd-parity error rejection (OPER), in particular the method of actively odd parity pairing (AOPP), can drastically improve the asymptotic key rate of sending-or-not-sending twin-field (SNS-TF) quantum key distribution (QKD). However, in practice, the finite-key effects have to be considered for the security. Here, we propose a zigzag approach to verify the phase-flip error of the survived bits after OPER or AOPP. Based on this, we can take all the finite-key effects efficiently in calculating the non-asymptotic key rate. Numerical simulation shows that our approach here produces the highest key rate over all distances among all existing methods, improving the key rate by more than 100% to 3000% in comparison with different prior art methods with typical experimental setting. These verify the advantages of the AOPP method with finite data size. Also, with our zigzag approach here, the non-asymptotic key rate of SNS-TF QKD can by far break the absolute bound of repeater-less key rate with whatever detection efficiency. We can even reach a non-asymptotic key rate more than 40 times of the practical bound and 13 times of the absolute bound with 1012 pulses.Keywords
Funding Information
- National Natural Science Foundation of China (11474182)
- the national key Research and Development Program of China (2017YFA0303901)
This publication has 89 references indexed in Scilit:
- A quantum access networkNature, 2013
- Tight finite-key analysis for quantum cryptographyNature Communications, 2012
- Full-field implementation of a perfect eavesdropper on a quantum cryptography systemNature Communications, 2011
- Field test of quantum key distribution in the Tokyo QKD NetworkOptics Express, 2011
- Hacking commercial quantum cryptography systems by tailored bright illuminationNature Photonics, 2010
- Quantum Cryptography with Finite Resources: Unconditional Security Bound for Discrete-Variable Protocols with One-Way PostprocessingPhysical Review Letters, 2008
- Long-Distance Decoy-State Quantum Key Distribution in Optical FiberPhysical Review Letters, 2007
- Decoy State Quantum Key DistributionPhysical Review Letters, 2005
- Beating the Photon-Number-Splitting Attack in Practical Quantum CryptographyPhysical Review Letters, 2005
- Quantum Key Distribution with Two-Qubit Quantum CodesPhysical Review Letters, 2004