首页> 中文期刊> 《电子学报(英文版)》 >Fair Efficiency Comparisons of Decoy-State Quantum Key Distribution Protocols

Fair Efficiency Comparisons of Decoy-State Quantum Key Distribution Protocols

         

摘要

Taking the schemes based on diff erent for-mulas of secure key rate as examples, we give a fair com-parison between typical protocols under Universal compos-able (UC) security frame. Through analyzing the relation-ship of security parameters in post-processing stage and final secure key rate, we achieve the unified quantification between protocols based on Gottesman-Lo-Lütkenhaus-Preskill (GLLP) formula and the ones under UC security. Based on the above research, the impact of diff erent send-ing lengths and secure parameters on secure key rate is in-vestigated. Besides, we analyze the conditions of fair com-parison, and for the first time we give a fair comparison between the protocols based on GLLP formula and smooth entropy. By typical efficiency comparisons, we summarize the way for improving secure key rate in the light intensity choice and the single bit error rate estimation method.

著录项

  • 来源
    《电子学报(英文版)》 |2018年第2期|241-249|共9页
  • 作者单位

    Information Engineering University, Luoyang 471003, China;

    State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou 450001, China;

    State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou 450001, China;

    Information Engineering University, Luoyang 471003, China;

    Information Engineering University, Luoyang 471003, China;

    Information Engineering University, Luoyang 471003, China;

    College of Animal Science and Technology, Henan University of Science and Technology, Luoyang 471003, China;

    State Key Laboratory of Mathematical Engineering and Advanced Computing, Zhengzhou 450001, China;

  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号