Numerical method for finite-size security analysis of quantum key distribution

Quantum key distribution (QKD) enables secure information exchange with untrusted quantum links between remote communication parties. A central task in the studies of QKD protocols is security analysis, which aims at deriving the length of the final key such that it is secure regardless of the eaves...

Full description

Bibliographic Details
Main Authors: Hongyi Zhou, Toshihiko Sasaki, Masato Koashi
Format: Article
Language:English
Published: American Physical Society 2022-08-01
Series:Physical Review Research
Online Access:http://doi.org/10.1103/PhysRevResearch.4.033126
_version_ 1827285464290164736
author Hongyi Zhou
Toshihiko Sasaki
Masato Koashi
author_facet Hongyi Zhou
Toshihiko Sasaki
Masato Koashi
author_sort Hongyi Zhou
collection DOAJ
description Quantum key distribution (QKD) enables secure information exchange with untrusted quantum links between remote communication parties. A central task in the studies of QKD protocols is security analysis, which aims at deriving the length of the final key such that it is secure regardless of the eavesdropper's computational power. In literature, the security analysis has been done both analytically and numerically. Compared to analytical methods which tend to require techniques specific to each QKD protocol, numerical ones are more general since they can be directly applied to many QKD protocols with little adaptation. However, current numerical methods are carried out based on some assumptions such as working in the asymptotic limit and collective attacks from eavesdroppers. In this work, we remove these assumptions and develop a numerical finite-size security analysis against general attacks for a large class of QKD protocols. We also give an example of applying the method to the recent phase-matching QKD protocol with a simplified protocol design. Our result shows that the finite-size key rate can surpass the linear key-rate bound with a practical QKD system operated for only several hours.
first_indexed 2024-04-24T10:13:59Z
format Article
id doaj.art-6fb452d0b42e4448a9034bab02688d25
institution Directory Open Access Journal
issn 2643-1564
language English
last_indexed 2024-04-24T10:13:59Z
publishDate 2022-08-01
publisher American Physical Society
record_format Article
series Physical Review Research
spelling doaj.art-6fb452d0b42e4448a9034bab02688d252024-04-12T17:23:40ZengAmerican Physical SocietyPhysical Review Research2643-15642022-08-014303312610.1103/PhysRevResearch.4.033126Numerical method for finite-size security analysis of quantum key distributionHongyi ZhouToshihiko SasakiMasato KoashiQuantum key distribution (QKD) enables secure information exchange with untrusted quantum links between remote communication parties. A central task in the studies of QKD protocols is security analysis, which aims at deriving the length of the final key such that it is secure regardless of the eavesdropper's computational power. In literature, the security analysis has been done both analytically and numerically. Compared to analytical methods which tend to require techniques specific to each QKD protocol, numerical ones are more general since they can be directly applied to many QKD protocols with little adaptation. However, current numerical methods are carried out based on some assumptions such as working in the asymptotic limit and collective attacks from eavesdroppers. In this work, we remove these assumptions and develop a numerical finite-size security analysis against general attacks for a large class of QKD protocols. We also give an example of applying the method to the recent phase-matching QKD protocol with a simplified protocol design. Our result shows that the finite-size key rate can surpass the linear key-rate bound with a practical QKD system operated for only several hours.http://doi.org/10.1103/PhysRevResearch.4.033126
spellingShingle Hongyi Zhou
Toshihiko Sasaki
Masato Koashi
Numerical method for finite-size security analysis of quantum key distribution
Physical Review Research
title Numerical method for finite-size security analysis of quantum key distribution
title_full Numerical method for finite-size security analysis of quantum key distribution
title_fullStr Numerical method for finite-size security analysis of quantum key distribution
title_full_unstemmed Numerical method for finite-size security analysis of quantum key distribution
title_short Numerical method for finite-size security analysis of quantum key distribution
title_sort numerical method for finite size security analysis of quantum key distribution
url http://doi.org/10.1103/PhysRevResearch.4.033126
work_keys_str_mv AT hongyizhou numericalmethodforfinitesizesecurityanalysisofquantumkeydistribution
AT toshihikosasaki numericalmethodforfinitesizesecurityanalysisofquantumkeydistribution
AT masatokoashi numericalmethodforfinitesizesecurityanalysisofquantumkeydistribution