Finite key analysis for symmetric attacks in quantum key distribution
Journal Article
·
· Physical Review. A
- Institut fuer Theoretische Physik III, Heinrich-Heine-Universitaet Duesseldorf, D-40225 Duesseldorf (Germany)
We introduce a constructive method to calculate the achievable secret key rate for a generic class of quantum key distribution protocols, when only a finite number n of signals is given. Our approach is applicable to all scenarios in which the quantum state shared by Alice and Bob is known. In particular, we consider the six state protocol with symmetric eavesdropping attacks, and show that for a small number of signals, i.e., below n{approx}10{sup 4}, the finite key rate differs significantly from the asymptotic value for n{yields}{infinity}. However, for larger n, a good approximation of the asymptotic value is found. We also study secret key rates for protocols using higher-dimensional quantum systems.
- OSTI ID:
- 20857858
- Journal Information:
- Physical Review. A, Journal Name: Physical Review. A Journal Issue: 4 Vol. 74; ISSN 1050-2947; ISSN PLRAAN
- Country of Publication:
- United States
- Language:
- English
Similar Records
Security of the Bennett 1992 quantum-key distribution protocol against individual attack over a realistic channel
Quantum key distribution with finite resources: Secret key rates via Renyi entropies
Unconditional security proof of a deterministic quantum key distribution with a two-way quantum channel
Journal Article
·
Fri Feb 28 23:00:00 EST 2003
· Physical Review. A
·
OSTI ID:20633825
Quantum key distribution with finite resources: Secret key rates via Renyi entropies
Journal Article
·
Thu Sep 15 00:00:00 EDT 2011
· Physical Review. A
·
OSTI ID:22068666
Unconditional security proof of a deterministic quantum key distribution with a two-way quantum channel
Journal Article
·
Sat Oct 15 00:00:00 EDT 2011
· Physical Review. A
·
OSTI ID:22080383