Finite-key analysis for measurement-device-independent quantum key distribution
Open Access
- 29 April 2014
- journal article
- research article
- Published by Springer Science and Business Media LLC in Nature Communications
- Vol. 5 (1), 3732
- https://doi.org/10.1038/ncomms4732
Abstract
Quantum key distribution promises unconditionally secure communications. However, as practical devices tend to deviate from their specifications, the security of some practical systems is no longer valid. In particular, an adversary can exploit imperfect detectors to learn a large part of the secret key, even though the security proof claims otherwise. Recently, a practical approach—measurement-device-independent quantum key distribution—has been proposed to solve this problem. However, so far its security has only been fully proven under the assumption that the legitimate users of the system have unlimited resources. Here we fill this gap and provide a rigorous security proof against general attacks in the finite-key regime. This is obtained by applying large deviation theory, specifically the Chernoff bound, to perform parameter estimation. For the first time we demonstrate the feasibility of long-distance implementations of measurement-device-independent quantum key distribution within a reasonable time frame of signal transmission.Other Versions
This publication has 47 references indexed in Scilit:
- Experimental quantum key distribution with finite-key security analysis for noisy channelsNature Communications, 2013
- Device-Independent Quantum Key Distribution with Local Bell TestPhysical Review X, 2013
- Tight finite-key analysis for quantum cryptographyNature Communications, 2012
- Quantum eavesdropping without interception: an attack exploiting the dead time of single-photon detectorsNew Journal of Physics, 2011
- Hacking commercial quantum cryptography systems by tailored bright illuminationNature Photonics, 2010
- Device independent quantum key distribution secure against coherent attacks with memoryless measurement devicesNew Journal of Physics, 2009
- Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systemsPhysical Review A, 2008
- Security of Practical Time-Reversed EPR Quantum Key DistributionAlgorithmica, 2002
- Estimates for practical quantum cryptographyPhysical Review A, 1999
- Weighted sums of certain dependent random variablesTohoku Mathematical Journal, 1967