File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Article: Security of quantum key distribution with iterative sifting

TitleSecurity of quantum key distribution with iterative sifting
Authors
KeywordsQKDprotocol
information theoretic security
quantum key distribution
Issue Date2018
Citation
Quantum Science and Technology, 2018, v. 3, n. 1, article no. 014002 How to Cite?
Abstract© 2017 IOP Publishing Ltd. Several quantum key distribution (QKD) protocols employ iterative sifting. After each quantum transmission round, Alice and Bob disclose part of their setting information (including their basis choices) for the detected signals. This quantum phase then ends when the basis dependent termination conditions are met, i.e., the numbers of detected signals per basis exceed certain pre-agreed threshold values. Recently, however, Pfister et al (2016 New J. Phys. 18 053001) showed that the basis dependent termination condition makes QKD insecure, especially in the finite key regime, and they suggested to disclose all the setting information after finishing the quantum phase. However, this protocol has two main drawbacks: it requires that Alice possesses a large memory, and she also needs to have some a priori knowledge about the transmission rate of the quantum channel. Here we solve these two problems by introducing a basis-independent termination condition to the iterative sifting in the finite key regime. The use of this condition, in combination with Azuma's inequality, provides a precise estimation on the amount of privacy amplification that needs to be applied, thus leading to the security of QKD protocols, including the loss-tolerant protocol (Tamaki et al 2014 Phys. Rev. A 90 052314), with iterative sifting. Our analysis indicates that to announce the basis information after each quantum transmission round does not compromise the key generation rate of the loss-tolerant protocol. Our result allows the implementation of wider classes of classical post-processing techniques in QKD with quantified security.
Persistent Identifierhttp://hdl.handle.net/10722/285811
ISI Accession Number ID

 

DC FieldValueLanguage
dc.contributor.authorTamaki, Kiyoshi-
dc.contributor.authorLo, Hoi Kwong-
dc.contributor.authorMizutani, Akihiro-
dc.contributor.authorKato, Go-
dc.contributor.authorLim, Charles Ci Wen-
dc.contributor.authorAzuma, Koji-
dc.contributor.authorCurty, Marcos-
dc.date.accessioned2020-08-18T04:56:42Z-
dc.date.available2020-08-18T04:56:42Z-
dc.date.issued2018-
dc.identifier.citationQuantum Science and Technology, 2018, v. 3, n. 1, article no. 014002-
dc.identifier.urihttp://hdl.handle.net/10722/285811-
dc.description.abstract© 2017 IOP Publishing Ltd. Several quantum key distribution (QKD) protocols employ iterative sifting. After each quantum transmission round, Alice and Bob disclose part of their setting information (including their basis choices) for the detected signals. This quantum phase then ends when the basis dependent termination conditions are met, i.e., the numbers of detected signals per basis exceed certain pre-agreed threshold values. Recently, however, Pfister et al (2016 New J. Phys. 18 053001) showed that the basis dependent termination condition makes QKD insecure, especially in the finite key regime, and they suggested to disclose all the setting information after finishing the quantum phase. However, this protocol has two main drawbacks: it requires that Alice possesses a large memory, and she also needs to have some a priori knowledge about the transmission rate of the quantum channel. Here we solve these two problems by introducing a basis-independent termination condition to the iterative sifting in the finite key regime. The use of this condition, in combination with Azuma's inequality, provides a precise estimation on the amount of privacy amplification that needs to be applied, thus leading to the security of QKD protocols, including the loss-tolerant protocol (Tamaki et al 2014 Phys. Rev. A 90 052314), with iterative sifting. Our analysis indicates that to announce the basis information after each quantum transmission round does not compromise the key generation rate of the loss-tolerant protocol. Our result allows the implementation of wider classes of classical post-processing techniques in QKD with quantified security.-
dc.languageeng-
dc.relation.ispartofQuantum Science and Technology-
dc.subjectQKDprotocol-
dc.subjectinformation theoretic security-
dc.subjectquantum key distribution-
dc.titleSecurity of quantum key distribution with iterative sifting-
dc.typeArticle-
dc.description.naturelink_to_subscribed_fulltext-
dc.identifier.doi10.1088/2058-9565/aa89bd-
dc.identifier.scopuseid_2-s2.0-85048098124-
dc.identifier.volume3-
dc.identifier.issue1-
dc.identifier.spagearticle no. 014002-
dc.identifier.epagearticle no. 014002-
dc.identifier.eissn2058-9565-
dc.identifier.isiWOS:000427381500002-
dc.identifier.issnl2058-9565-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats