| Literature DB >> 22252558 |
Marco Tomamichel1, Charles Ci Wen Lim, Nicolas Gisin, Renato Renner.
Abstract
Despite enormous theoretical and experimental progress in quantum cryptography, the security of most current implementations of quantum key distribution is still not rigorously established. One significant problem is that the security of the final key strongly depends on the number, M, of signals exchanged between the legitimate parties. Yet, existing security proofs are often only valid asymptotically, for unrealistically large values of M. Another challenge is that most security proofs are very sensitive to small differences between the physical devices used by the protocol and the theoretical model used to describe them. Here we show that these gaps between theory and experiment can be simultaneously overcome by using a recently developed proof technique based on the uncertainty relation for smooth entropies.Entities:
Year: 2012 PMID: 22252558 PMCID: PMC3274703 DOI: 10.1038/ncomms1631
Source DB: PubMed Journal: Nat Commun ISSN: 2041-1723 Impact factor: 14.919
Figure 1Expected key rate as function of the block size.
Plot of expected key rate r as a function of the block size n for channel bit error rates Q∈{1%, 2.5%, 5%} (from left to right). The security rate is fixed to =10−14.
Optimized parameters for security rate ɛ/ℓ=10−14.
| 104 | 1.0 | 11.7 | 14.0 | 38.2 | 2.48 | 2.3 |
| 2.5 | 6.8 | 10.4 | 43.0 | 3.78 | 3.0 | |
| 105 | 1.0 | 30.4 | 36.4 | 22.0 | 2.14 | 0.8 |
| 2.5 | 21.5 | 32.6 | 23.3 | 3.58 | 1.0 | |
| 106 | 1.0 | 47.8 | 57.1 | 12.5 | 1.73 | 0.6 |
| 2.5 | 35.7 | 53.9 | 13.7 | 3.21 | 0.7 |
The column labelled rrel shows the deviation of the expected secret key rate from the corresponding asymptotic value, that is, rrel:=r/(1−2h(Q)).
Figure 2Comparison of key rate with earlier results.
The plots show the rate ℓ/N as a function of the sifted key length N=n+k for various channel bit error rates Q (as in Fig. 1) and a security bound of ɛ=10−10. The (curved) dashed lines show the rates that can be proven secure using ref. 18. The horizontal dashed lines indicate the asymptotic rates for Q∈{1%, 2.5%, 5%} (from top to bottom).