Finite key analysis for symmetric attacks in quantum key distribution
- 30 October 2006
- journal article
- research article
- Published by American Physical Society (APS) in Physical Review A
- Vol. 74 (4), 042340
- https://doi.org/10.1103/physreva.74.042340
Abstract
We introduce a constructive method to calculate the achievable secret key rate for a generic class of quantum key distribution protocols, when only a finite number of signals is given. Our approach is applicable to all scenarios in which the quantum state shared by Alice and Bob is known. In particular, we consider the six state protocol with symmetric eavesdropping attacks, and show that for a small number of signals, i.e., below , the finite key rate differs significantly from the asymptotic value for . However, for larger , a good approximation of the asymptotic value is found. We also study secret key rates for protocols using higher-dimensional quantum systems.
Keywords
This publication has 16 references indexed in Scilit:
- Information-theoretic security proof for quantum-key-distribution protocolsPhysical Review A, 2005
- Entanglement as a Precondition for Secure Quantum Key DistributionPhysical Review Letters, 2004
- Quantum Cryptography Protocols Robust against Photon Number Splitting Attacks for Weak Laser Pulse ImplementationsPhysical Review Letters, 2004
- Classical data compression with quantum side informationPhysical Review A, 2003
- Incoherent and coherent eavesdropping in the six-state protocol of quantum cryptographyPhysical Review A, 1999
- Optimal Eavesdropping in Quantum Cryptography with Six StatesPhysical Review Letters, 1998
- Secret key agreement by public discussion from common informationIEEE Transactions on Information Theory, 1993
- Quantum cryptography using any two nonorthogonal statesPhysical Review Letters, 1992
- Quantum cryptography without Bell’s theoremPhysical Review Letters, 1992
- Quantum cryptography based on Bell’s theoremPhysical Review Letters, 1991