2019
DOI: 10.48550/arxiv.1910.11407
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Tight finite-key security for twin-field quantum key distribution

Guillermo Curras Lorenzo,
Alvaro Navarrete,
Koji Azuma
et al.
Help me understand this report
View published versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
14
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 10 publications
(14 citation statements)
references
References 55 publications
0
14
0
Order By: Relevance
“…One can directly substitute the experimental statistics into our framework and obtain secure finite-size key rates, without knowing any techniques of security analysis. To show how to apply our framework, we give an example of the recent Twin-Field QKD or Phase-Matching QKD [28,29], which are proved to surpass the linear key-rate bound [30,31] in finite-size cases [32,33]. Our result shows such a result can still be achieved even with simplified protocol designs.…”
Section: Introductionmentioning
confidence: 95%
See 1 more Smart Citation
“…One can directly substitute the experimental statistics into our framework and obtain secure finite-size key rates, without knowing any techniques of security analysis. To show how to apply our framework, we give an example of the recent Twin-Field QKD or Phase-Matching QKD [28,29], which are proved to surpass the linear key-rate bound [30,31] in finite-size cases [32,33]. Our result shows such a result can still be achieved even with simplified protocol designs.…”
Section: Introductionmentioning
confidence: 95%
“…where ǫ is the given failure probability satisfying 0 < ǫ ≤ 1. The optimization problem can be solved analytically [33],…”
Section: Example: Phase-matching Qkdmentioning
confidence: 99%
“…36(2y+1) z0(y) = 0, i.e. the second condition (7), and the concavity of the function G(x, y, z) with respect to x, i.e. the third condition (8).…”
Section: Proof Of Theoremmentioning
confidence: 99%
“…Many relations [1,2,3,4] are known to be martingale concentration inequalities. However, we will use the former interpretation, because there are situations where the conditional expectation itself has physical meaning [5,6,7], and the natural premises in the former case are not always natural in the latter case. Note that the condition on the expected values is necessary because we can easily define correlated random values such that the sum of the observed values is far from that of the expected values with high probability.…”
Section: Introductionmentioning
confidence: 99%
“…This idea, sketched in Fig. 1a, was proved secure against general attacks [20][21][22][23][24] also in the finite-size scenario [25][26][27] and with the aid of two-way communication [28], but it is based on the critical assumptions that the optical pulses are phase-coherent in Alice and Bob and preserve coherence throughout the path to Charlie. While the first requirement can be fulfilled by phase-locking the two QKD lasers in Alice and Bob to a common reference laser transmitted through a service channel, the uncorrelated fluctuations of the length and refractive index of the connecting paths (i.e.…”
mentioning
confidence: 99%