File Download
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1103/PhysRevA.102.012611
- Scopus: eid_2-s2.0-85088598282
- WOS: WOS:000548531300003
- Find via
Supplementary
- Citations:
- Appears in Collections:
Article: Security of finite-key-length measurement-device-independent quantum key distribution using an arbitrary number of decoys
Title | Security of finite-key-length measurement-device-independent quantum key distribution using an arbitrary number of decoys |
---|---|
Authors | |
Keywords | Network security Quantum theory Arbitrary number Cooperative agents Inversion formula |
Issue Date | 2020 |
Publisher | American Physical Society. The Journal's web site is located at http://journals.aps.org/pra/ |
Citation | Physical Review A: covering atomic, molecular, and optical physics and quantum information, 2020, v. 102 n. 1, p. 012611:1-012611:12 How to Cite? |
Abstract | In quantum key distribution, measurement-device-independent and decoy-state techniques enable the two cooperative agents to establish a shared secret key using imperfect measurement devices and weak Poissonian sources, respectively. Investigations so far are not comprehensive as they restrict to less than or equal to four decoy states. Moreover, many of them involve pure numerical studies. Here I report a general security proof that works for any fixed number of decoy states and any fixed raw key length. There are two key ideas involved here. The first one is the repeated application of the inversion formula for the Vandermonde matrix to obtain various bounds on certain yields and error rates. The second one is the use of a recently proven generalization of the McDiarmid inequality. These techniques raise the best provably secure key rate of the measurement-device-independent version of the Bennett-Brassard 1984 scheme by at least 1.25 times and increase the workable distance between the two cooperative agents from slightly less than 60 km to slightly greater than 130 km in case where there are 1010 photon pulse pairs sent without a quantum repeater. |
Persistent Identifier | http://hdl.handle.net/10722/284598 |
ISSN | 2023 Impact Factor: 2.6 2023 SCImago Journal Rankings: 1.081 |
ISI Accession Number ID |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Chau, HF | - |
dc.date.accessioned | 2020-08-07T08:59:56Z | - |
dc.date.available | 2020-08-07T08:59:56Z | - |
dc.date.issued | 2020 | - |
dc.identifier.citation | Physical Review A: covering atomic, molecular, and optical physics and quantum information, 2020, v. 102 n. 1, p. 012611:1-012611:12 | - |
dc.identifier.issn | 2469-9926 | - |
dc.identifier.uri | http://hdl.handle.net/10722/284598 | - |
dc.description.abstract | In quantum key distribution, measurement-device-independent and decoy-state techniques enable the two cooperative agents to establish a shared secret key using imperfect measurement devices and weak Poissonian sources, respectively. Investigations so far are not comprehensive as they restrict to less than or equal to four decoy states. Moreover, many of them involve pure numerical studies. Here I report a general security proof that works for any fixed number of decoy states and any fixed raw key length. There are two key ideas involved here. The first one is the repeated application of the inversion formula for the Vandermonde matrix to obtain various bounds on certain yields and error rates. The second one is the use of a recently proven generalization of the McDiarmid inequality. These techniques raise the best provably secure key rate of the measurement-device-independent version of the Bennett-Brassard 1984 scheme by at least 1.25 times and increase the workable distance between the two cooperative agents from slightly less than 60 km to slightly greater than 130 km in case where there are 10<font size=-1><sup>10</sup></font> photon pulse pairs sent without a quantum repeater. | - |
dc.language | eng | - |
dc.publisher | American Physical Society. The Journal's web site is located at http://journals.aps.org/pra/ | - |
dc.relation.ispartof | Physical Review A: covering atomic, molecular, and optical physics and quantum information | - |
dc.rights | Physical Review A: covering atomic, molecular, and optical physics and quantum information. Copyright © American Physical Society. | - |
dc.rights | Copyright [2020] by The American Physical Society. This article is available online at [http://dx.doi.org/10.1103/PhysRevA.102.012611]. | - |
dc.subject | Network security | - |
dc.subject | Quantum theory | - |
dc.subject | Arbitrary number | - |
dc.subject | Cooperative agents | - |
dc.subject | Inversion formula | - |
dc.title | Security of finite-key-length measurement-device-independent quantum key distribution using an arbitrary number of decoys | - |
dc.type | Article | - |
dc.identifier.email | Chau, HF: hfchau@hku.hk | - |
dc.identifier.authority | Chau, HF=rp00669 | - |
dc.description.nature | published_or_final_version | - |
dc.identifier.doi | 10.1103/PhysRevA.102.012611 | - |
dc.identifier.scopus | eid_2-s2.0-85088598282 | - |
dc.identifier.hkuros | 312501 | - |
dc.identifier.volume | 102 | - |
dc.identifier.issue | 1 | - |
dc.identifier.spage | 012611:1 | - |
dc.identifier.epage | 012611:12 | - |
dc.identifier.isi | WOS:000548531300003 | - |
dc.publisher.place | United States | - |
dc.identifier.issnl | 2469-9926 | - |