ترغب بنشر مسار تعليمي؟ اضغط هنا

Security Bounds for Quantum Cryptography with Finite Resources

125   0   0.0 ( 0 )
 نشر من قبل Valerio Scarani
 تاريخ النشر 2008
  مجال البحث فيزياء
والبحث باللغة English




اسأل ChatGPT حول البحث

A practical quantum key distribution (QKD) protocol necessarily runs in finite time and, hence, only a finite amount of communication is exchanged. This is in contrast to most of the standard results on the security of QKD, which only hold in the limit where the number of transmitted signals approaches infinity. Here, we analyze the security of QKD under the realistic assumption that the amount of communication is finite. At the level of the general formalism, we present new results that help simplifying the actual implementation of QKD protocols: in particular, we show that symmetrization steps, which are required by certain security proofs (e.g., proofs based on de Finettis representation theorem), can be omitted in practical implementations. Also, we demonstrate how two-way reconciliation protocols can be taken into account in the security analysis. At the level of numerical estimates, we present the bounds with finite resources for ``device-independent security against collective attacks.



قيم البحث

اقرأ أيضاً

We derive a bound for the security of QKD with finite resources under one-way post-processing, based on a definition of security that is composable and has an operational meaning. While our proof relies on the assumption of collective attacks, uncond itional security follows immediately for standard protocols like Bennett-Brassard 1984 and six-states. For single-qubit implementations of such protocols, we find that the secret key rate becomes positive when at least Nsim 10^5 signals are exchanged and processed. For any other discrete-variable protocol, unconditional security can be obtained using the exponential de Finetti theorem, but the additional overhead leads to very pessimistic estimates.
In this thesis we study the finite-size analysis of two continuous-variables quantum key distribution schemes. The first one is the one-way protocol using Gaussian modulation of thermal states and the other is the measurement-device-independent proto col. To do so, we adopt an efficient channel parameter estimation method based on the assumption of the Gaussian variables and the central limit theorem introduced by Ruppert et al. [Phys. Rev. A 90, 062310 (2014)]. Furthermore, we present a composable security analysis of the measurement device independent protocol for coherent attacks with a channel parameter estimation that is not based on the central limit theorem. We also investigated, in the asymptotic regime, an asymmetric situation for the authenticated parties against the eavesdropper caused by fast-fading channels. Here we assume that the eavesdropper has the full control of the communication channel and can instantaneously change its transmissivity in every use of it. We assumed the simple model of a uniform fading and addressed the cases of one-way protocols, continuous-measurement device-independent protocol in symmetric configuration and its star network extension for three users. Finally, we extended the asymptotic study of the one-way protocols using an arbitrary number of phase-encoded coherent states assuming a thermal loss channel without using a Gaussian approximation.
323 - Y.J. Lu , Luobei Zhu , 2005
Weak coherent states as a photon source for quantum cryptography have limit in secure data rate and transmission distance because of the presence of multi-photon events and loss in transmission line. Two-photon events in a coherent state can be taken out by a two-photon interference scheme. We investigate the security issue of utilizing this modified coherent state in quantum cryptography. A 4 dB improvement in secure data rate or a nearly two-fold increase in transmission distance over the coherent state are found. With a recently proposed and improved encoding strategy, further improvement is possible.
Entanglement-measurement attack is a well-known attack in quantum cryptography. In quantum cryptography protocols, eavesdropping checking can resist this attack. There are two known eavesdropping checking methods. One is to use decoy photon technolog y for eavesdropping checking. The other is to use the entanglement correlation of two groups of non-orthogonal entangled states for eavesdropping checking. In this paper, we prove the security against entanglement-measurement attack for the qudit-system-based quantum cryptography protocols which use the two methods for eavesdropping checking. Our security proof is useful to improve the eavesdropping checking method used in quantum cryptography protocols.
We study the impact of finite-size effects on the security of thermal one-way quantum cryptography. Our approach considers coherent/squeezed states at the preparation stage, on the top of which the sender adds trusted thermal noise. We compute the ke y rate incorporating finite-size effects, and we obtain the security threshold at different frequencies. As expected finite-size effects deteriorate the performance of thermal quantum cryptography. Our analysis is useful to quantify the impact of this degradation on relevant parameters like tolerable attenuation, transmission frequencies at which one can achieve security.
التعليقات
جاري جلب التعليقات جاري جلب التعليقات
سجل دخول لتتمكن من متابعة معايير البحث التي قمت باختيارها
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا