2014
DOI: 10.1088/1367-2630/16/6/063009
|View full text |Cite
|
Sign up to set email alerts
|

Security analysis of the decoy method with the Bennett–Brassard 1984 protocol for finite key lengths

Abstract: This paper provides a formula for the sacrifice bit-length for privacy amplification with the Bennett-Brassard 1984 protocol for finite key lengths, when we employ the decoy method. Using the formula, we can guarantee the security parameter for a realizable quantum key distribution system. The key generation rates with finite key lengths are numerically evaluated. The proposed method improves the existing key generation rate even in the asymptotic setting.In this paper, when Aliceʼs basis is the same as Bobʼs … Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

2
87
0

Year Published

2014
2014
2025
2025

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 66 publications
(89 citation statements)
references
References 58 publications
2
87
0
Order By: Relevance
“…Intensity fluctuation is also a potential threat as already discussed in [5,15,16] especially for decoy-BB84 QKD protocol. In [15], general theory of security performance of QKD under intensity fluctuation is described with assumption that Eve can knows the relatively strong and weak pulses.…”
Section: Security Threatmentioning
confidence: 97%
See 1 more Smart Citation
“…Intensity fluctuation is also a potential threat as already discussed in [5,15,16] especially for decoy-BB84 QKD protocol. In [15], general theory of security performance of QKD under intensity fluctuation is described with assumption that Eve can knows the relatively strong and weak pulses.…”
Section: Security Threatmentioning
confidence: 97%
“…It claims that secure key rate described in [9] can be decreased to 70.8 bits/s under intensity error upper bound of 5%, which was originally 136.3 bits/s. Security analysis with intensity fluctuation has been studied [16,17] in diverse situations because it can seriously decrease secure key rates.…”
Section: Security Threatmentioning
confidence: 99%
“…This allowed to improve the decoy-state bounds and achieve experimental key rates beyond 1 Mbps over a 50 km optical fiber link, still under the condition of collective attacks [24]. In [50], the same numerical PE based on BI distribution as in [24] and [49] was used 3 to prove for the first time the security of the eds-BB84 protocol against general attacks, assuming a perfect vacuum state prepared by Alice and the quantities analogous to (see Table I) exactly known. The resulting HG distribution was upper bounded by the sum of two BI distributions [50].…”
Section: A State Of the Art And Comparisonmentioning
confidence: 99%
“…In [50], the same numerical PE based on BI distribution as in [24] and [49] was used 3 to prove for the first time the security of the eds-BB84 protocol against general attacks, assuming a perfect vacuum state prepared by Alice and the quantities analogous to (see Table I) exactly known. The resulting HG distribution was upper bounded by the sum of two BI distributions [50]. Later on, a simpler proof of eds-BB84 security against general attacks, based on the entropic uncertainty relations [35], [36], was provided in [38].…”
Section: A State Of the Art And Comparisonmentioning
confidence: 99%
See 1 more Smart Citation