We gratefully acknowledge support from
the Simons Foundation and member institutions.
Full-text links:

Download:

Current browse context:

quant-ph

References & Citations

Bookmark

(what is this?)
CiteULike logo BibSonomy logo Mendeley logo del.icio.us logo Digg logo Reddit logo

Quantum Physics

Title: Security bounds for efficient decoy-state quantum key distribution

Abstract: Information-theoretical security of quantum key distribution (QKD) has been convincingly proven in recent years and remarkable experiments have shown the potential of QKD for real world applications. Due to its unique capability of combining high key rate and security in a realistic finite-size scenario, the efficient version of the BB84 QKD protocol endowed with decoy states has been subject of intensive research. Its recent experimental implementation finally demonstrated a secure key rate beyond 1 Mbps over a 50 km optical fiber. However the achieved rate holds under the restrictive assumption that the eavesdropper performs collective attacks. Here, we review the protocol and generalize its security. We exploit a map by Ahrens to rigorously upper bound the Hypergeometric distribution resulting from a general eavesdropping. Despite the extended applicability of the new protocol, its key rate is only marginally smaller than its predecessor in all cases of practical interest.
Comments: 8 pages, 2 figures, 2 tables. Special Issue on Quantum Communication & Cryptography
Subjects: Quantum Physics (quant-ph)
Journal reference: IEEE Journal of Selected Topics in Quantum Electronics, vol.21, no.3, pp.1-8, May-June 2015
DOI: 10.1109/JSTQE.2015.2394774
Cite as: arXiv:1503.07335 [quant-ph]
  (or arXiv:1503.07335v1 [quant-ph] for this version)

Submission history

From: Marco Lucamarini [view email]
[v1] Wed, 25 Mar 2015 11:17:29 GMT (405kb)

Link back to: arXiv, form interface, contact.