File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Article: Finite-key analysis for measurement-device-independent quantum key distribution

TitleFinite-key analysis for measurement-device-independent quantum key distribution
Authors
Issue Date2014
Citation
Nature Communications, 2014, v. 5, article no. 3732 How to Cite?
AbstractQuantum key distribution promises unconditionally secure communications. However, as practical devices tend to deviate from their specifications, the security of some practical systems is no longer valid. In particular, an adversary can exploit imperfect detectors to learn a large part of the secret key, even though the security proof claims otherwise. Recently, a practical approach - measurement-device-independent quantum key distribution - has been proposed to solve this problem. However, so far its security has only been fully proven under the assumption that the legitimate users of the system have unlimited resources. Here we fill this gap and provide a rigorous security proof against general attacks in the finite-key regime. This is obtained by applying large deviation theory, specifically the Chernoff bound, to perform parameter estimation. For the first time we demonstrate the feasibility of long-distance implementations of measurement-device-independent quantum key distribution within a reasonable time frame of signal transmission. © 2014 Macmillan Publishers Limited.
Persistent Identifierhttp://hdl.handle.net/10722/285734
ISI Accession Number ID

 

DC FieldValueLanguage
dc.contributor.authorCurty, Marcos-
dc.contributor.authorXu, Feihu-
dc.contributor.authorCui, Wei-
dc.contributor.authorLim, Charles Ci Wen-
dc.contributor.authorTamaki, Kiyoshi-
dc.contributor.authorLo, Hoi Kwong-
dc.date.accessioned2020-08-18T04:56:30Z-
dc.date.available2020-08-18T04:56:30Z-
dc.date.issued2014-
dc.identifier.citationNature Communications, 2014, v. 5, article no. 3732-
dc.identifier.urihttp://hdl.handle.net/10722/285734-
dc.description.abstractQuantum key distribution promises unconditionally secure communications. However, as practical devices tend to deviate from their specifications, the security of some practical systems is no longer valid. In particular, an adversary can exploit imperfect detectors to learn a large part of the secret key, even though the security proof claims otherwise. Recently, a practical approach - measurement-device-independent quantum key distribution - has been proposed to solve this problem. However, so far its security has only been fully proven under the assumption that the legitimate users of the system have unlimited resources. Here we fill this gap and provide a rigorous security proof against general attacks in the finite-key regime. This is obtained by applying large deviation theory, specifically the Chernoff bound, to perform parameter estimation. For the first time we demonstrate the feasibility of long-distance implementations of measurement-device-independent quantum key distribution within a reasonable time frame of signal transmission. © 2014 Macmillan Publishers Limited.-
dc.languageeng-
dc.relation.ispartofNature Communications-
dc.titleFinite-key analysis for measurement-device-independent quantum key distribution-
dc.typeArticle-
dc.description.naturelink_to_subscribed_fulltext-
dc.identifier.doi10.1038/ncomms4732-
dc.identifier.pmid24776959-
dc.identifier.scopuseid_2-s2.0-84899852555-
dc.identifier.volume5-
dc.identifier.spagearticle no. 3732-
dc.identifier.epagearticle no. 3732-
dc.identifier.eissn2041-1723-
dc.identifier.isiWOS:000335223400001-
dc.identifier.issnl2041-1723-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats