Security proof for variable-length quantum key distribution
We present a security proof for variable-length QKD in the Renner framework against IID collective attacks. Our proof can be lifted to coherent attacks using the postselection technique. Our first main result is a theorem to convert a sequence of security proofs for fixed-length protocols satisfying...
Main Authors: | Devashish Tupkary, Ernest Y.-Z. Tan, Norbert Lütkenhaus |
---|---|
Format: | Article |
Language: | English |
Published: |
American Physical Society
2024-04-01
|
Series: | Physical Review Research |
Online Access: | http://doi.org/10.1103/PhysRevResearch.6.023002 |
Similar Items
-
Postselection Technique for Optical Quantum Key Distribution with Improved de Finetti Reductions
by: Shlok Nahar, et al.
Published: (2024-10-01) -
Security proof of practical quantum key distribution with detection-efficiency mismatch
by: Yanbao Zhang, et al.
Published: (2021-01-01) -
Security-proof framework for two-way Gaussian quantum-key-distribution protocols
by: Zhang, Zheshen, et al.
Published: (2018) -
Asymptotic Security Analysis of Discrete-Modulated Continuous-Variable Quantum Key Distribution
by: Jie Lin, et al.
Published: (2019-12-01) -
Numerical security proof for the decoy-state BB84 protocol and measurement-device-independent quantum key distribution resistant against large basis misalignment
by: Wenyuan Wang, et al.
Published: (2022-11-01)