Literature DB >> 18518517

Quantum cryptography with finite resources: unconditional security bound for discrete-variable protocols with one-way postprocessing.

Valerio Scarani1, Renato Renner.   

Abstract

We derive a bound for the security of quantum key distribution with finite resources under one-way postprocessing, based on a definition of security that is composable and has an operational meaning. While our proof relies on the assumption of collective attacks, unconditional security follows immediately for standard protocols such as Bennett-Brassard 1984 and six-states protocol. For single-qubit implementations of such protocols, we find that the secret key rate becomes positive when at least N approximately 10(5) signals are exchanged and processed. For any other discrete-variable protocol, unconditional security can be obtained using the exponential de Finetti theorem, but the additional overhead leads to very pessimistic estimates.

Year:  2008        PMID: 18518517     DOI: 10.1103/PhysRevLett.100.200501

Source DB:  PubMed          Journal:  Phys Rev Lett        ISSN: 0031-9007            Impact factor:   9.161


  14 in total

1.  A quantum access network.

Authors:  Bernd Fröhlich; James F Dynes; Marco Lucamarini; Andrew W Sharpe; Zhiliang Yuan; Andrew J Shields
Journal:  Nature       Date:  2013-09-05       Impact factor: 49.962

2.  The ultimate physical limits of privacy.

Authors:  Artur Ekert; Renato Renner
Journal:  Nature       Date:  2014-03-27       Impact factor: 49.962

3.  Tight finite-key analysis for quantum cryptography.

Authors:  Marco Tomamichel; Charles Ci Wen Lim; Nicolas Gisin; Renato Renner
Journal:  Nat Commun       Date:  2012-01-17       Impact factor: 14.919

4.  Proof-of-principle experiment of reference-frame-independent quantum key distribution with phase coding.

Authors:  Wen-Ye Liang; Shuang Wang; Hong-Wei Li; Zhen-Qiang Yin; Wei Chen; Yao Yao; Jing-Zheng Huang; Guang-Can Guo; Zheng-Fu Han
Journal:  Sci Rep       Date:  2014-01-09       Impact factor: 4.379

5.  Finite-key security analyses on passive decoy-state QKD protocols with different unstable sources.

Authors:  Ting-Ting Song; Su-Juan Qin; Qiao-Yan Wen; Yu-Kun Wang; Heng-Yue Jia
Journal:  Sci Rep       Date:  2015-10-16       Impact factor: 4.379

6.  Measurement-device-independent quantum key distribution via quantum blockade.

Authors:  Yi-Heng Zhou; Zong-Wen Yu; Ao Li; Xiao-Long Hu; Cong Jiang; Xiang-Bin Wang
Journal:  Sci Rep       Date:  2018-03-07       Impact factor: 4.379

7.  Simulating of the measurement-device independent quantum key distribution with phase randomized general sources.

Authors:  Qin Wang; Xiang-Bin Wang
Journal:  Sci Rep       Date:  2014-04-14       Impact factor: 4.379

8.  Numerical approach for unstructured quantum key distribution.

Authors:  Patrick J Coles; Eric M Metodiev; Norbert Lütkenhaus
Journal:  Nat Commun       Date:  2016-05-20       Impact factor: 14.919

9.  Experimental realization of equiangular three-state quantum key distribution.

Authors:  Matteo Schiavon; Giuseppe Vallone; Paolo Villoresi
Journal:  Sci Rep       Date:  2016-07-28       Impact factor: 4.379

10.  Practical device-independent quantum cryptography via entropy accumulation.

Authors:  Rotem Arnon-Friedman; Frédéric Dupuis; Omar Fawzi; Renato Renner; Thomas Vidick
Journal:  Nat Commun       Date:  2018-01-31       Impact factor: 14.919

View more

北京卡尤迪生物科技股份有限公司 © 2022-2023.