File Download
  Links for fulltext
     (May Require Subscription)
Supplementary

Article: Security of finite-key-length measurement-device-independent quantum key distribution using an arbitrary number of decoys

TitleSecurity of finite-key-length measurement-device-independent quantum key distribution using an arbitrary number of decoys
Authors
KeywordsNetwork security
Quantum theory
Arbitrary number
Cooperative agents
Inversion formula
Issue Date2020
PublisherAmerican Physical Society. The Journal's web site is located at http://journals.aps.org/pra/
Citation
Physical Review A: covering atomic, molecular, and optical physics and quantum information, 2020, v. 102 n. 1, p. 012611:1-012611:12 How to Cite?
AbstractIn quantum key distribution, measurement-device-independent and decoy-state techniques enable the two cooperative agents to establish a shared secret key using imperfect measurement devices and weak Poissonian sources, respectively. Investigations so far are not comprehensive as they restrict to less than or equal to four decoy states. Moreover, many of them involve pure numerical studies. Here I report a general security proof that works for any fixed number of decoy states and any fixed raw key length. There are two key ideas involved here. The first one is the repeated application of the inversion formula for the Vandermonde matrix to obtain various bounds on certain yields and error rates. The second one is the use of a recently proven generalization of the McDiarmid inequality. These techniques raise the best provably secure key rate of the measurement-device-independent version of the Bennett-Brassard 1984 scheme by at least 1.25 times and increase the workable distance between the two cooperative agents from slightly less than 60 km to slightly greater than 130 km in case where there are 1010 photon pulse pairs sent without a quantum repeater.
Persistent Identifierhttp://hdl.handle.net/10722/284598
ISSN
2023 Impact Factor: 2.6
2023 SCImago Journal Rankings: 1.081
ISI Accession Number ID

 

DC FieldValueLanguage
dc.contributor.authorChau, HF-
dc.date.accessioned2020-08-07T08:59:56Z-
dc.date.available2020-08-07T08:59:56Z-
dc.date.issued2020-
dc.identifier.citationPhysical Review A: covering atomic, molecular, and optical physics and quantum information, 2020, v. 102 n. 1, p. 012611:1-012611:12-
dc.identifier.issn2469-9926-
dc.identifier.urihttp://hdl.handle.net/10722/284598-
dc.description.abstractIn quantum key distribution, measurement-device-independent and decoy-state techniques enable the two cooperative agents to establish a shared secret key using imperfect measurement devices and weak Poissonian sources, respectively. Investigations so far are not comprehensive as they restrict to less than or equal to four decoy states. Moreover, many of them involve pure numerical studies. Here I report a general security proof that works for any fixed number of decoy states and any fixed raw key length. There are two key ideas involved here. The first one is the repeated application of the inversion formula for the Vandermonde matrix to obtain various bounds on certain yields and error rates. The second one is the use of a recently proven generalization of the McDiarmid inequality. These techniques raise the best provably secure key rate of the measurement-device-independent version of the Bennett-Brassard 1984 scheme by at least 1.25 times and increase the workable distance between the two cooperative agents from slightly less than 60 km to slightly greater than 130 km in case where there are 10<font size=-1><sup>10</sup></font> photon pulse pairs sent without a quantum repeater.-
dc.languageeng-
dc.publisherAmerican Physical Society. The Journal's web site is located at http://journals.aps.org/pra/-
dc.relation.ispartofPhysical Review A: covering atomic, molecular, and optical physics and quantum information-
dc.rightsPhysical Review A: covering atomic, molecular, and optical physics and quantum information. Copyright © American Physical Society.-
dc.rightsCopyright [2020] by The American Physical Society. This article is available online at [http://dx.doi.org/10.1103/PhysRevA.102.012611].-
dc.subjectNetwork security-
dc.subjectQuantum theory-
dc.subjectArbitrary number-
dc.subjectCooperative agents-
dc.subjectInversion formula-
dc.titleSecurity of finite-key-length measurement-device-independent quantum key distribution using an arbitrary number of decoys-
dc.typeArticle-
dc.identifier.emailChau, HF: hfchau@hku.hk-
dc.identifier.authorityChau, HF=rp00669-
dc.description.naturepublished_or_final_version-
dc.identifier.doi10.1103/PhysRevA.102.012611-
dc.identifier.scopuseid_2-s2.0-85088598282-
dc.identifier.hkuros312501-
dc.identifier.volume102-
dc.identifier.issue1-
dc.identifier.spage012611:1-
dc.identifier.epage012611:12-
dc.identifier.isiWOS:000548531300003-
dc.publisher.placeUnited States-
dc.identifier.issnl2469-9926-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats