Numerical method for finite-size security analysis of quantum key distribution
Quantum key distribution (QKD) enables secure information exchange with untrusted quantum links between remote communication parties. A central task in the studies of QKD protocols is security analysis, which aims at deriving the length of the final key such that it is secure regardless of the eaves...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
American Physical Society
2022-08-01
|
Series: | Physical Review Research |
Online Access: | http://doi.org/10.1103/PhysRevResearch.4.033126 |
_version_ | 1827285464290164736 |
---|---|
author | Hongyi Zhou Toshihiko Sasaki Masato Koashi |
author_facet | Hongyi Zhou Toshihiko Sasaki Masato Koashi |
author_sort | Hongyi Zhou |
collection | DOAJ |
description | Quantum key distribution (QKD) enables secure information exchange with untrusted quantum links between remote communication parties. A central task in the studies of QKD protocols is security analysis, which aims at deriving the length of the final key such that it is secure regardless of the eavesdropper's computational power. In literature, the security analysis has been done both analytically and numerically. Compared to analytical methods which tend to require techniques specific to each QKD protocol, numerical ones are more general since they can be directly applied to many QKD protocols with little adaptation. However, current numerical methods are carried out based on some assumptions such as working in the asymptotic limit and collective attacks from eavesdroppers. In this work, we remove these assumptions and develop a numerical finite-size security analysis against general attacks for a large class of QKD protocols. We also give an example of applying the method to the recent phase-matching QKD protocol with a simplified protocol design. Our result shows that the finite-size key rate can surpass the linear key-rate bound with a practical QKD system operated for only several hours. |
first_indexed | 2024-04-24T10:13:59Z |
format | Article |
id | doaj.art-6fb452d0b42e4448a9034bab02688d25 |
institution | Directory Open Access Journal |
issn | 2643-1564 |
language | English |
last_indexed | 2024-04-24T10:13:59Z |
publishDate | 2022-08-01 |
publisher | American Physical Society |
record_format | Article |
series | Physical Review Research |
spelling | doaj.art-6fb452d0b42e4448a9034bab02688d252024-04-12T17:23:40ZengAmerican Physical SocietyPhysical Review Research2643-15642022-08-014303312610.1103/PhysRevResearch.4.033126Numerical method for finite-size security analysis of quantum key distributionHongyi ZhouToshihiko SasakiMasato KoashiQuantum key distribution (QKD) enables secure information exchange with untrusted quantum links between remote communication parties. A central task in the studies of QKD protocols is security analysis, which aims at deriving the length of the final key such that it is secure regardless of the eavesdropper's computational power. In literature, the security analysis has been done both analytically and numerically. Compared to analytical methods which tend to require techniques specific to each QKD protocol, numerical ones are more general since they can be directly applied to many QKD protocols with little adaptation. However, current numerical methods are carried out based on some assumptions such as working in the asymptotic limit and collective attacks from eavesdroppers. In this work, we remove these assumptions and develop a numerical finite-size security analysis against general attacks for a large class of QKD protocols. We also give an example of applying the method to the recent phase-matching QKD protocol with a simplified protocol design. Our result shows that the finite-size key rate can surpass the linear key-rate bound with a practical QKD system operated for only several hours.http://doi.org/10.1103/PhysRevResearch.4.033126 |
spellingShingle | Hongyi Zhou Toshihiko Sasaki Masato Koashi Numerical method for finite-size security analysis of quantum key distribution Physical Review Research |
title | Numerical method for finite-size security analysis of quantum key distribution |
title_full | Numerical method for finite-size security analysis of quantum key distribution |
title_fullStr | Numerical method for finite-size security analysis of quantum key distribution |
title_full_unstemmed | Numerical method for finite-size security analysis of quantum key distribution |
title_short | Numerical method for finite-size security analysis of quantum key distribution |
title_sort | numerical method for finite size security analysis of quantum key distribution |
url | http://doi.org/10.1103/PhysRevResearch.4.033126 |
work_keys_str_mv | AT hongyizhou numericalmethodforfinitesizesecurityanalysisofquantumkeydistribution AT toshihikosasaki numericalmethodforfinitesizesecurityanalysisofquantumkeydistribution AT masatokoashi numericalmethodforfinitesizesecurityanalysisofquantumkeydistribution |