Finite-key analysis for twin-field quantum key distribution based on
generalized operator dominance condition
- URL: http://arxiv.org/abs/2007.08861v1
- Date: Fri, 17 Jul 2020 09:41:06 GMT
- Title: Finite-key analysis for twin-field quantum key distribution based on
generalized operator dominance condition
- Authors: Rui-Qiang Wang, Zhen-Qiang Yin, Feng-Yu Lu, Rong Wang, Shuang Wang,
Wei Chen, Wei Huang, Bing-Jie Xu, Guang-Can Guo and Zheng-Fu Han
- Abstract summary: Quantum key distribution (QKD) can help two distant peers to share secret key bits, whose security is guaranteed by the law of physics.
Recently, twin-field (TF) QKD has been proposed and intensively studied, since it can beat the rate-distance limit.
We propose an improved finite-key analysis of TF-QKD through new operator dominance condition.
- Score: 23.004519226886444
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Quantum key distribution (QKD) can help two distant peers to share secret key
bits, whose security is guaranteed by the law of physics. In practice, the
secret key rate of a QKD protocol is always lowered with the increasing of
channel distance, which severely limits the applications of QKD. Recently,
twin-field (TF) QKD has been proposed and intensively studied, since it can
beat the rate-distance limit and greatly increase the achievable distance of
QKD. Remarkalebly, K. Maeda et. al. proposed a simple finite-key analysis for
TF-QKD based on operator dominance condition. Although they showed that their
method is sufficient to beat the rate-distance limit, their operator dominance
condition is not general, i.e. it can be only applied in three decoy states
scenarios, which implies that its key rate cannot be increased by introducing
more decoy states, and also cannot reach the asymptotic bound even in case of
preparing infinite decoy states and optical pulses. Here, to bridge this gap,
we propose an improved finite-key analysis of TF-QKD through devising new
operator dominance condition. We show that by adding the number of decoy
states, the secret key rate can be furtherly improved and approach the
asymptotic bound. Our theory can be directly used in TF-QKD experiment to
obtain higher secret key rate. Our results can be directly used in experiments
to obtain higher key rates.
Related papers
- Rethinking SIGN Training: Provable Nonconvex Acceleration without First-
and Second-Order Gradient Lipschitz [66.22095739795068]
Sign-based methods have gained attention due to their ability to achieve robust performance despite only using only the sign information for parameter updates.
The current convergence analysis of sign-based methods relies on the strong assumptions of first-order acceleration and second-order acceleration.
In this paper we analyze their convergence under more realistic assumptions of first- and second-order acceleration.
arXiv Detail & Related papers (2023-10-23T06:48:43Z) - Single-emitter quantum key distribution over 175 km of fiber with
optimised finite key rates [45.82374977939355]
We perform fibre-based quantum key distribution with a quantum dot frequency-converted to telecom wavelength.
We demonstrate positive key rates up to 175 km in the regime.
This result represents major progress towards the feasibility of long-distance single-emitter QKD networks.
arXiv Detail & Related papers (2022-09-07T18:03:36Z) - Finite-key analysis for quantum key distribution with discrete phase
randomization [21.561489948824274]
We develop a technique based on conjugate measurement and quantum state distinguishment to ana-lyze the security.
Our result shows that TF-QKD with reasonable number of discrete random phases, e.g. 8 phases from 0, pi/4, pi/2,..., 7pi/4, can achieve satisfactory performance.
arXiv Detail & Related papers (2022-01-09T15:45:44Z) - Composably secure data processing for Gaussian-modulated continuous
variable quantum key distribution [58.720142291102135]
Continuous-variable quantum key distribution (QKD) employs the quadratures of a bosonic mode to establish a secret key between two remote parties.
We consider a protocol with homodyne detection in the general setting of composable finite-size security.
In particular, we analyze the high signal-to-noise regime which requires the use of high-rate (non-binary) low-density parity check codes.
arXiv Detail & Related papers (2021-03-30T18:02:55Z) - Sending or not sending twin-field quantum key distribution with
distinguishable decoy states [10.66830089114367]
We find the external modulation of different intensity states through the test, required in those TF-QKD with post-phase compensation, shows a side channel in frequency domain.
We propose a complete and undetected eavesdropping attack, named passive frequency shift attack, on sending or not-sending TF-QKD protocol.
Our results emphasize the importance of practical security at source and might provide a valuable reference for the practical implementation of TF-QKD.
arXiv Detail & Related papers (2021-01-27T09:37:41Z) - Recent advances on quantum key distribution overcoming the linear secret
key capacity bound [0.0]
A crucial goal for quantum key distribution (QKD) is to transmit unconditionally secure keys over long distances.
In 2018, the seminal twin-field (TF) QKD protocol was proposed to provide a remarkable solution to overcoming the linear secret key capacity bound.
This article presents an up-to-date survey on recent developments in this area.
arXiv Detail & Related papers (2020-11-26T02:11:53Z) - Twin-field quantum key distribution with passive-decoy state [22.26373392802507]
We propose passive-decoy based TF-QKD, in which we combine TF-QKD with the passive-decoy method.
We present a simulation comparing the key generation rate with that in active-decoy, the result shows our scheme performs as good as active decoy TF-QKD.
arXiv Detail & Related papers (2020-11-15T04:02:48Z) - Upper bounds on device-independent quantum key distribution [4.7840623105240585]
Device-independent quantum key distribution (DIQKD) is a version of QKD with a stronger notion of security.
We study the rate at which DIQKD can be carried out for a given bipartite quantum state distributed between the sender and receiver.
arXiv Detail & Related papers (2020-05-27T17:41:38Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.