Quantum Cryptography with Finite Resources: Unconditional Security Bound for Discrete-Variable Protocols with One-Way Postprocessing
Top Cited Papers
- 22 May 2008
- journal article
- research article
- Published by American Physical Society (APS) in Physical Review Letters
- Vol. 100 (20), 200501
- https://doi.org/10.1103/physrevlett.100.200501
Abstract
We derive a bound for the security of quantum key distribution with finite resources under one-way postprocessing, based on a definition of security that is composable and has an operational meaning. While our proof relies on the assumption of collective attacks, unconditional security follows immediately for standard protocols such as Bennett-Brassard 1984 and six-states protocol. For single-qubit implementations of such protocols, we find that the secret key rate becomes positive when at least N similar to 10(5) signals are exchanged and processed. For any other discrete-variable protocol, unconditional security can be obtained using the exponential de Finetti theorem, but the additional overhead leads to very pessimistic estimates.Keywords
Other Versions
This publication has 19 references indexed in Scilit:
- Upper bounds of eavesdropper’s performances in finite-length code with the decoy methodPhysical Review A, 2007
- Small Accessible Quantum Information Does Not Imply SecurityPhysical Review Letters, 2007
- Unconditional security of practical quantum key distributionThe European Physical Journal D, 2007
- Finite key analysis for symmetric attacks in quantum key distributionPhysical Review A, 2006
- Practical evaluation of security for quantum key distributionPhysical Review A, 2006
- Lower and Upper Bounds on the Secret-Key Rate for Quantum Key Distribution Protocols Using One-Way Classical CommunicationPhysical Review Letters, 2005
- Distillation of secret key and entanglement from quantum statesProceedings of the Royal Society A: Mathematical, Physical and Engineering Sciences, 2005
- Quantum cryptographyReviews of Modern Physics, 2002
- Optimal Eavesdropping in Quantum Cryptography with Six StatesPhysical Review Letters, 1998
- Quantum cryptography based on Bell’s theoremPhysical Review Letters, 1991