2021
DOI: 10.48550/arxiv.2111.08315
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Numerical Method for Finite-size Security Analysis of Quantum Key Distribution

Abstract: Quantum key distribution (QKD) establishes secure links between remote communication parties. As a key problem for various QKD protocols, security analysis gives the amount of secure keys regardless of the eavesdropper's computational power, which can be done both analytically and numerically. Compared to analytical methods which tend to require techniques specific to each QKD protocol, numerical ones are more general since they can be directly applied to many QKD protocols without additional techniques. Howev… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 35 publications
0
2
0
Order By: Relevance
“…Whether we can apply the refined concentration inequality [62] with the information accessible in our protocol (in a similar fashion to Ref. [63]) may be an interesting problem.…”
Section: Discussionmentioning
confidence: 99%
“…Whether we can apply the refined concentration inequality [62] with the information accessible in our protocol (in a similar fashion to Ref. [63]) may be an interesting problem.…”
Section: Discussionmentioning
confidence: 99%
“…Applying ν nom j will lead to a looser upper bound of the guessing probability, which will not affect the security. One can refer to [24] for detailed discussions.…”
Section: B Randomness Quantification In Asymptotic Limitmentioning
confidence: 99%