File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1103/PhysRevA.79.032335
- Scopus: eid_2-s2.0-64149125849
- WOS: WOS:000264770200064
- Find via
Supplementary
- Citations:
- Appears in Collections:
Article: Upper bounds for the secure key rate of the decoy-state quantum key distribution
Title | Upper bounds for the secure key rate of the decoy-state quantum key distribution |
---|---|
Authors | |
Issue Date | 2009 |
Citation | Physical Review A - Atomic, Molecular, and Optical Physics, 2009, v. 79, n. 3, article no. 032335 How to Cite? |
Abstract | The use of decoy states in quantum key distribution (QKD) has provided a method for substantially increasing the secret key rate and distance that can be covered by QKD protocols with practical signals. The security analysis of these schemes, however, leaves open the possibility that the development of better proof techniques or better classical postprocessing methods might further improve their performance in realistic scenarios. In this paper, we derive upper bounds on the secure key rate for decoy-state QKD. These bounds are based basically only on the classical correlations established by the legitimate users during the quantum communication phase of the protocol. The only assumption about the possible postprocessing methods is that double click events are randomly assigned to single click events. Further, we consider only secure key rates based on the uncalibrated device scenario which assigns imperfections such as detection inefficiency to the eavesdropper. Our analysis relies on two preconditions for secure two-way and one-way QKD. The legitimate users need to prove that there exists no separable state (in the case of two-way QKD) or that there exists no quantum state having a symmetric extension (one-way QKD) that is compatible with the available measurements results. Both criteria have been previously applied to evaluate single-photon implementations of QKD. Here we use them to investigate a realistic source of weak coherent pulses. The resulting upper bounds can be formulated as a convex optimization problem known as a semidefinite program which can be efficiently solved. For the standard four-state QKD protocol, they are quite close to known lower bounds, thus showing that there are clear limits to the further improvement of classical postprocessing techniques in decoy-state QKD. © 2009 The American Physical Society. |
Persistent Identifier | http://hdl.handle.net/10722/285645 |
ISSN | 2014 Impact Factor: 2.808 |
ISI Accession Number ID |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Curty, Marcos | - |
dc.contributor.author | Moroder, Tobias | - |
dc.contributor.author | Ma, Xiongfeng | - |
dc.contributor.author | Lo, Hoi Kwong | - |
dc.contributor.author | Lütkenhaus, Norbert | - |
dc.date.accessioned | 2020-08-18T04:56:17Z | - |
dc.date.available | 2020-08-18T04:56:17Z | - |
dc.date.issued | 2009 | - |
dc.identifier.citation | Physical Review A - Atomic, Molecular, and Optical Physics, 2009, v. 79, n. 3, article no. 032335 | - |
dc.identifier.issn | 1050-2947 | - |
dc.identifier.uri | http://hdl.handle.net/10722/285645 | - |
dc.description.abstract | The use of decoy states in quantum key distribution (QKD) has provided a method for substantially increasing the secret key rate and distance that can be covered by QKD protocols with practical signals. The security analysis of these schemes, however, leaves open the possibility that the development of better proof techniques or better classical postprocessing methods might further improve their performance in realistic scenarios. In this paper, we derive upper bounds on the secure key rate for decoy-state QKD. These bounds are based basically only on the classical correlations established by the legitimate users during the quantum communication phase of the protocol. The only assumption about the possible postprocessing methods is that double click events are randomly assigned to single click events. Further, we consider only secure key rates based on the uncalibrated device scenario which assigns imperfections such as detection inefficiency to the eavesdropper. Our analysis relies on two preconditions for secure two-way and one-way QKD. The legitimate users need to prove that there exists no separable state (in the case of two-way QKD) or that there exists no quantum state having a symmetric extension (one-way QKD) that is compatible with the available measurements results. Both criteria have been previously applied to evaluate single-photon implementations of QKD. Here we use them to investigate a realistic source of weak coherent pulses. The resulting upper bounds can be formulated as a convex optimization problem known as a semidefinite program which can be efficiently solved. For the standard four-state QKD protocol, they are quite close to known lower bounds, thus showing that there are clear limits to the further improvement of classical postprocessing techniques in decoy-state QKD. © 2009 The American Physical Society. | - |
dc.language | eng | - |
dc.relation.ispartof | Physical Review A - Atomic, Molecular, and Optical Physics | - |
dc.title | Upper bounds for the secure key rate of the decoy-state quantum key distribution | - |
dc.type | Article | - |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.doi | 10.1103/PhysRevA.79.032335 | - |
dc.identifier.scopus | eid_2-s2.0-64149125849 | - |
dc.identifier.volume | 79 | - |
dc.identifier.issue | 3 | - |
dc.identifier.spage | article no. 032335 | - |
dc.identifier.epage | article no. 032335 | - |
dc.identifier.eissn | 1094-1622 | - |
dc.identifier.isi | WOS:000264770200064 | - |
dc.identifier.issnl | 1050-2947 | - |