File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1088/2058-9565/aa89bd
- Scopus: eid_2-s2.0-85048098124
- WOS: WOS:000427381500002
Supplementary
- Citations:
- Appears in Collections:
Article: Security of quantum key distribution with iterative sifting
Title | Security of quantum key distribution with iterative sifting |
---|---|
Authors | |
Keywords | QKDprotocol information theoretic security quantum key distribution |
Issue Date | 2018 |
Citation | Quantum Science and Technology, 2018, v. 3, n. 1, article no. 014002 How to Cite? |
Abstract | © 2017 IOP Publishing Ltd. Several quantum key distribution (QKD) protocols employ iterative sifting. After each quantum transmission round, Alice and Bob disclose part of their setting information (including their basis choices) for the detected signals. This quantum phase then ends when the basis dependent termination conditions are met, i.e., the numbers of detected signals per basis exceed certain pre-agreed threshold values. Recently, however, Pfister et al (2016 New J. Phys. 18 053001) showed that the basis dependent termination condition makes QKD insecure, especially in the finite key regime, and they suggested to disclose all the setting information after finishing the quantum phase. However, this protocol has two main drawbacks: it requires that Alice possesses a large memory, and she also needs to have some a priori knowledge about the transmission rate of the quantum channel. Here we solve these two problems by introducing a basis-independent termination condition to the iterative sifting in the finite key regime. The use of this condition, in combination with Azuma's inequality, provides a precise estimation on the amount of privacy amplification that needs to be applied, thus leading to the security of QKD protocols, including the loss-tolerant protocol (Tamaki et al 2014 Phys. Rev. A 90 052314), with iterative sifting. Our analysis indicates that to announce the basis information after each quantum transmission round does not compromise the key generation rate of the loss-tolerant protocol. Our result allows the implementation of wider classes of classical post-processing techniques in QKD with quantified security. |
Persistent Identifier | http://hdl.handle.net/10722/285811 |
ISI Accession Number ID |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Tamaki, Kiyoshi | - |
dc.contributor.author | Lo, Hoi Kwong | - |
dc.contributor.author | Mizutani, Akihiro | - |
dc.contributor.author | Kato, Go | - |
dc.contributor.author | Lim, Charles Ci Wen | - |
dc.contributor.author | Azuma, Koji | - |
dc.contributor.author | Curty, Marcos | - |
dc.date.accessioned | 2020-08-18T04:56:42Z | - |
dc.date.available | 2020-08-18T04:56:42Z | - |
dc.date.issued | 2018 | - |
dc.identifier.citation | Quantum Science and Technology, 2018, v. 3, n. 1, article no. 014002 | - |
dc.identifier.uri | http://hdl.handle.net/10722/285811 | - |
dc.description.abstract | © 2017 IOP Publishing Ltd. Several quantum key distribution (QKD) protocols employ iterative sifting. After each quantum transmission round, Alice and Bob disclose part of their setting information (including their basis choices) for the detected signals. This quantum phase then ends when the basis dependent termination conditions are met, i.e., the numbers of detected signals per basis exceed certain pre-agreed threshold values. Recently, however, Pfister et al (2016 New J. Phys. 18 053001) showed that the basis dependent termination condition makes QKD insecure, especially in the finite key regime, and they suggested to disclose all the setting information after finishing the quantum phase. However, this protocol has two main drawbacks: it requires that Alice possesses a large memory, and she also needs to have some a priori knowledge about the transmission rate of the quantum channel. Here we solve these two problems by introducing a basis-independent termination condition to the iterative sifting in the finite key regime. The use of this condition, in combination with Azuma's inequality, provides a precise estimation on the amount of privacy amplification that needs to be applied, thus leading to the security of QKD protocols, including the loss-tolerant protocol (Tamaki et al 2014 Phys. Rev. A 90 052314), with iterative sifting. Our analysis indicates that to announce the basis information after each quantum transmission round does not compromise the key generation rate of the loss-tolerant protocol. Our result allows the implementation of wider classes of classical post-processing techniques in QKD with quantified security. | - |
dc.language | eng | - |
dc.relation.ispartof | Quantum Science and Technology | - |
dc.subject | QKDprotocol | - |
dc.subject | information theoretic security | - |
dc.subject | quantum key distribution | - |
dc.title | Security of quantum key distribution with iterative sifting | - |
dc.type | Article | - |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.doi | 10.1088/2058-9565/aa89bd | - |
dc.identifier.scopus | eid_2-s2.0-85048098124 | - |
dc.identifier.volume | 3 | - |
dc.identifier.issue | 1 | - |
dc.identifier.spage | article no. 014002 | - |
dc.identifier.epage | article no. 014002 | - |
dc.identifier.eissn | 2058-9565 | - |
dc.identifier.isi | WOS:000427381500002 | - |
dc.identifier.issnl | 2058-9565 | - |