期刊文献+

Security of biased BB84 quantum key distribution with finite resource

Security of biased BB84 quantum key distribution with finite resource
下载PDF
导出
摘要 In the original BB84 quantum key distribution protocol, the states are prepared and measured randomly, which lose the unmatched detection results. To improve the sifting efficiency, biased bases selection BB84 protocol is proposed. Meanwhile, a practical quantum key distribution protocol can only transmit a finite number of signals, resulting in keys of finite length. The previous techniques for finite-key analysis focus mainly on the statistical fluctuations of the error rates and yields of the qubits. However, the prior choice probabilities of the two bases also have fluctuations by taking into account the finite-size effect. In this paper, we discuss the security of biased decoy state BB84 protocol with finite resources by considering all of the statistical fluctuations. The results can be directly used in the experimental realizations. In the original BB84 quantum key distribution protocol, the states are prepared and measured randomly, which lose the unmatched detection results. To improve the sifting efficiency, biased bases selection BB84 protocol is proposed. Meanwhile, a practical quantum key distribution protocol can only transmit a finite number of signals, resulting in keys of finite length. The previous techniques for finite-key analysis focus mainly on the statistical fluctuations of the error rates and yields of the qubits. However, the prior choice probabilities of the two bases also have fluctuations by taking into account the finite-size effect. In this paper, we discuss the security of biased decoy state BB84 protocol with finite resources by considering all of the statistical fluctuations. The results can be directly used in the experimental realizations.
出处 《Chinese Physics B》 SCIE EI CAS CSCD 2014年第10期24-31,共8页 中国物理B(英文版)
基金 Project supported by the the National Natural Science Foundation of China(Grant Nos.61101137,61201239,61205118,and 11304397) the China Postdoctoral Science Foundation.(Grant No.2013M540514)
关键词 biased basis selection security bound quantum key distribution biased basis selection, security bound, quantum key distribution
  • 相关文献

参考文献30

  • 1Bennett CHand Brassard G 1984 Proceedings of IEEE International Conference on Computers, Systems and Signal Processing (Bangalore: IEEE) p. 175.
  • 2Ekert A K 1991 Phys. Rev. Lett. 67661.
  • 3Lo H K and Chau H F 1999 Science 283 2050.
  • 4Shor P Wand Preskill J 2000 Phys. Rev. Lett. 85441.
  • 5Mayers D 2001 J. ACM 48351.
  • 6Gottesman D, Lo H K, Liitkenhaus N and Preskill J 2004 arXiv preprint quant-phJ0212066.
  • 7Renner R, Gisin N and Kraus B 2005 Phys. Rev. A 72012332.
  • 8Chen W, Han Z F, Zhang T, Wen H, Yin Z Q, XU F X, Wu Q L, Liu Y, Zhang Y, Mo X F, Gui Y Z, Wei G and Guo G C 2009 IEEE Photon. Technol. Lett. 21 575.
  • 9Wan S, Chen W, Yin Z Q, Zhang Y, Zhang T, Li H W, Xu F X, Zhou Z, Yang Y, Huang D J, Zhang L J, Li F Y, Liu D, Wang Y G, Guo G C and Han Z F 2010 Opt. Lett. 35 2454.
  • 10Gisin N, Ribordy G, Tittel Wand Zbinden H 2001 Rev. Mod. Phys. 74 145.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部