2015
DOI: 10.1109/jstqe.2015.2394774
|View full text |Cite
|
Sign up to set email alerts
|

Security Bounds for Efficient Decoy-State Quantum Key Distribution

Abstract: Abstract-Information-theoretical security of quantum key distribution (QKD) has been convincingly proven in recent years and remarkable experiments have shown the potential of QKD for real world applications. Due to its unique capability of combining high key rate and security in a realistic finite-size scenario, the efficient version of the BB84 QKD protocol endowed with decoy states has been subject of intensive research. Its recent experimental implementation finally demonstrated a secure key rate beyond 1 … Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
30
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 24 publications
(30 citation statements)
references
References 55 publications
0
30
0
Order By: Relevance
“…In the asymptotic limit, this is justified by the equality y 1,1 Z = y 1,1 X . In the finite-size case, we can use the fact that, provided that the sample in the X basis is smaller than the one in the Z basis, the lower bound to y 1,1 X also represents a lower bound to y 1,1 Z [6]. The condition about the sizes of the two samples in the bases Z and X is fulfilled in our experiment, due to the higher photon flux used in the Z basis.…”
Section: Decoy State Estimationmentioning
confidence: 93%
See 2 more Smart Citations
“…In the asymptotic limit, this is justified by the equality y 1,1 Z = y 1,1 X . In the finite-size case, we can use the fact that, provided that the sample in the X basis is smaller than the one in the Z basis, the lower bound to y 1,1 X also represents a lower bound to y 1,1 Z [6]. The condition about the sizes of the two samples in the bases Z and X is fulfilled in our experiment, due to the higher photon flux used in the Z basis.…”
Section: Decoy State Estimationmentioning
confidence: 93%
“…
Security in quantum cryptography [1, 2] is continuously challenged by inventive attacks [3][4][5][6][7] targeting the real components of a cryptographic setup, and duly restored by new countermeasures [8][9][10] to foil them. Due to their high sensitivity and complex design, detectors are the most frequently attacked components.
…”
mentioning
confidence: 99%
See 1 more Smart Citation
“…42,43 Among those protocols, the security of decoy-state BB84 QKD has been extended to cover coherent attacks, for realistic block sizes and with a minimal sacrifice in the secret key rate. 44,45 Unfortunately, for coherent-one-way, the best security proof against coherent attacks currently gives a secret key rate that only scales quadratically with the loss. 46 For CV-QKD with coherent states and heterodyne detection, a composable security proof against the most general attacks has recently been provided, 47 but the current proof techniques do not allow a positive key rate for realistic block sizes in this case.…”
Section: Main Protocols and Implementationsmentioning
confidence: 99%
“…The idea of decoy state-based QKD protocols has been proposed and proved to be a good solution for substantially improving the performance of QKD based on weak coherent pulses (WCPs) to overcome the inherent shortage of using commercial available laser sources [8]- [10]. The security proof based on the uncertainty relation for smooth entropies [7], [11] has been applied in [12] and [13] to decoy state-based protocols. On the experimental side, QKD demonstration over long distances has been achieved for both optical fiber and free-space optical (FSO) links.…”
Section: Introductionmentioning
confidence: 99%