Finite-key analysis for practical implementations of quantum key distribution
Open Access
- 1 April 2009
- journal article
- Published by IOP Publishing in New Journal of Physics
- Vol. 11 (4), 045024
- https://doi.org/10.1088/1367-2630/11/4/045024
Abstract
The lists of bits processed in quantum key distribution are necessarily of finite length. The need for finite-key unconditional security bounds was recognized long ago, but the theoretical tools have become available only very recently. We provide finite-key unconditional security bounds for two practical implementations of the Bennett–Brassard 1984 coding: prepare-and-measure implementations without decoy states and entanglement-based implementations. A finite-key bound for prepare-and-measure implementations with decoy states is also derived under a simplified treatment of the statistical fluctuations. The presentation is tailored to allow direct application of the bounds in experiments. Finally, the bounds are also evaluated on a priori reasonable expected values of the observed parameters.Keywords
Other Versions
This publication has 36 references indexed in Scilit:
- Device-independent quantum key distribution secure against collective attacksNew Journal of Physics, 2009
- Effects of detector efficiency mismatch on security of quantum cryptosystemsPhysical Review A, 2006
- Unconditional security of quantum key distribution and the uncertainty principleJournal of Physics: Conference Series, 2006
- Performance of two quantum-key-distribution protocolsPhysical Review A, 2006
- Information-theoretic security proof for quantum-key-distribution protocolsPhysical Review A, 2005
- Practical decoy state for quantum key distributionPhysical Review A, 2005
- Faked states attack on quantum cryptosystemsJournal of Modern Optics, 2005
- Distillation of secret key and entanglement from quantum statesProceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences, 2005
- Efficient Quantum Key Distribution Scheme and a Proof of Its Unconditional SecurityJournal of Cryptology, 2004
- Estimates for practical quantum cryptographyPhysical Review A, 1999