2012
DOI: 10.1103/physreva.86.052305
|View full text |Cite
|
Sign up to set email alerts
|

Statistical fluctuation analysis for measurement-device-independent quantum key distribution

Abstract: Measurement-device-independent quantum key distribution with a finite number of decoy states is analyzed under finite-data-size assumption. By accounting for statistical fluctuations in parameter estimation, we investigate vacuum+weak-and vacuum+two-weak-decoy-state protocols. In each case, we find proper operation regimes, where the performance of our system is comparable to the asymptotic case for which the key size and the number of decoy states approach infinity.Our results show that practical implementati… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

1
219
1

Year Published

2014
2014
2024
2024

Publication Types

Select...
8

Relationship

1
7

Authors

Journals

citations
Cited by 197 publications
(221 citation statements)
references
References 45 publications
1
219
1
Order By: Relevance
“…Nevertheless, so far the security of mdiQKD has only been proven in the asymptotic regime 23 , which assumes that Alice and Bob have access to an unlimited amount of resources, or in the finite regime but only against particular types of attacks 30,31 . In summary, until now, a rigorous security proof of mdiQKD that takes full account of the finite size effects [32][33][34] has appeared to be missing and, for this reason, the feasibility of long-distance implementations of mdiQKD within a reasonable time frame of signal transmission has remained undemonstrated.…”
mentioning
confidence: 99%
“…Nevertheless, so far the security of mdiQKD has only been proven in the asymptotic regime 23 , which assumes that Alice and Bob have access to an unlimited amount of resources, or in the finite regime but only against particular types of attacks 30,31 . In summary, until now, a rigorous security proof of mdiQKD that takes full account of the finite size effects [32][33][34] has appeared to be missing and, for this reason, the feasibility of long-distance implementations of mdiQKD within a reasonable time frame of signal transmission has remained undemonstrated.…”
mentioning
confidence: 99%
“…
Security in quantum cryptography [1, 2] is continuously challenged by inventive attacks [3][4][5][6][7] targeting the real components of a cryptographic setup, and duly restored by new countermeasures [8][9][10] to foil them. Due to their high sensitivity and complex design, detectors are the most frequently attacked components.
…”
mentioning
confidence: 99%
“…In principle, they can use the decoy-state version of BB84, but, for the sake of our comparison, it would be sufficient to assume that both memory-assisted and memory-less systems use single photons to encode their bits. The multi-photon terms in a decoy-state protocol can be characterized by statistical analysis and they will not impose a change in the rate scaling [16]. The pulse duration is denoted by t p , and it is assumed to be equal to T in our numerical analysis.…”
Section: Device Modelingmentioning
confidence: 99%
“…We use phase encoding in the dual rail setup, or, equivalently, and if allowed by the quantum memory setups, time-bin encoding in a single-rail setup, in bases Z and X [16]. We assume that efficient QKD protocols are in use [53], where basis Z is chosen most often.…”
Section: Device Modelingmentioning
confidence: 99%
See 1 more Smart Citation