...
首页> 外文期刊>Physical Review, A. Atomic, molecular, and optical physics >Upper bounds for the secure key rate of the decoy-state quantum key distribution
【24h】

Upper bounds for the secure key rate of the decoy-state quantum key distribution

机译:诱骗态量子密钥分配的安全密钥率的上限

获取原文
获取原文并翻译 | 示例
   

获取外文期刊封面封底 >>

       

摘要

The use of decoy states in quantum key distribution (QKD) has provided a method for substantially increas-ing the secret key rate and distance that can be covered by QKD protocols with practical signals. The security analysis of these schemes, however, leaves open the possibility that the development of better proof techniques or better classical postprocessing methods might further improve their performance in realistic scenarios. In this paper, we derive upper bounds on the secure key rate for decoy-state QKD. These bounds are based basically only on the classical correlations established by the legitimate users during the quantum communi- cation phase of the protocol. The only assumption about the possible postprocessing methods is that double click events are randomly assigned to single click events. Further, we consider only secure key rates based on the uncalibrated device scenario which assigns imperfections such as detection inefficiency to the eavesdrop-per. Our analysis relies on two preconditions for secure two-way and one-way QKD. The legitimate users need to prove that there exists no separable state (in the case of two-way QKD) or that there exists no quantum state having a symmetric extension (one-way QKD) that is compatible with the available measurements results. Both criteria have been previously applied to evaluate single-photon implementations of QKD. Here we use them to investigate a realistic source of weak coherent pulses. The resulting upper bounds can be formulated as a convex optimization problem known as a semidefinite program which can be efficiently solved. For the standard four-state QKD protocol, they are quite close to known lower bounds, thus showing that there are clear limits to the further improvement of classical postprocessing techniques in decoy-state QKD.
机译:量子密钥分发(QKD)中诱骗状态的使用提供了一种实质上提高QKD协议所涵盖的实用信号的秘密密钥速率和距离的方法。但是,这些方案的安全性分析为更好的证明技术或更好的经典后处理方法的开发留出了可能进一步提高其在实际情况下的性能的可能性。在本文中,我们推导了诱饵状态QKD的安全密钥率的上限。这些界限基本上仅基于合法用户在协议的量子通信阶段建立的经典相关性。关于可能的后处理方法的唯一假设是,将双击事件随机分配给单击事件。此外,我们仅基于未校准的设备方案来考虑安全密钥率,该方案将缺陷(例如,检测效率低下)分配给窃听者。我们的分析依赖于安全的双向QKD的两个前提。合法用户需要证明不存在可分离状态(在双向QKD的情况下),或者不存在具有与可用测量结果兼容的对称扩展的量子态(单向QKD)。这两个标准先前都已应用于评估QKD的单光子实现。在这里,我们使用它们来研究弱相干脉冲的现实来源。可以将最终的上限公式化为可有效解决的称为半定程序的凸优化问题。对于标准的四态QKD协议,它们非常接近已知的下界,因此表明对诱捕态QKD中的经典后处理技术的进一步改进存在明显的局限性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号