Numerical finite-key analysis of quantum key distribution

© 2020, The Author(s). Quantum key distribution (QKD) allows for secure communications safe against attacks by quantum computers. QKD protocols are performed by sending a sizeable, but finite, number of quantum signals between the distant parties involved. Many QKD experiments, however, predict thei...

Full description

Bibliographic Details
Main Authors: Bunandar, Darius, Govia, Luke CG, Krovi, Hari, Englund, Dirk
Other Authors: Massachusetts Institute of Technology. Research Laboratory of Electronics
Format: Article
Language:English
Published: Springer Science and Business Media LLC 2022
Online Access:https://hdl.handle.net/1721.1/143531
_version_ 1811093579493277696
author Bunandar, Darius
Govia, Luke CG
Krovi, Hari
Englund, Dirk
author2 Massachusetts Institute of Technology. Research Laboratory of Electronics
author_facet Massachusetts Institute of Technology. Research Laboratory of Electronics
Bunandar, Darius
Govia, Luke CG
Krovi, Hari
Englund, Dirk
author_sort Bunandar, Darius
collection MIT
description © 2020, The Author(s). Quantum key distribution (QKD) allows for secure communications safe against attacks by quantum computers. QKD protocols are performed by sending a sizeable, but finite, number of quantum signals between the distant parties involved. Many QKD experiments, however, predict their achievable key rates using asymptotic formulas, which assume the transmission of an infinite number of signals, partly because QKD proofs with finite transmissions (and finite-key lengths) can be difficult. Here we develop a robust numerical approach for calculating the key rates for QKD protocols in the finite-key regime in terms of two semi-definite programs (SDPs). The first uses the relation between conditional smooth min-entropy and quantum relative entropy through the quantum asymptotic equipartition property, and the second uses the relation between the smooth min-entropy and quantum fidelity. The numerical programs are formulated under the assumption of collective attacks from the eavesdropper and can be promoted to withstand coherent attacks using the postselection technique. We then solve these SDPs using convex optimization solvers and obtain numerical calculations of finite-key rates for several protocols difficult to analyze analytically, such as BB84 with unequal detector efficiencies, B92, and twin-field QKD. Our numerical approach democratizes the composable security proofs for QKD protocols where the derived keys can be used as an input to another cryptosystem.
first_indexed 2024-09-23T15:47:21Z
format Article
id mit-1721.1/143531
institution Massachusetts Institute of Technology
language English
last_indexed 2024-09-23T15:47:21Z
publishDate 2022
publisher Springer Science and Business Media LLC
record_format dspace
spelling mit-1721.1/1435312023-06-12T17:58:24Z Numerical finite-key analysis of quantum key distribution Bunandar, Darius Govia, Luke CG Krovi, Hari Englund, Dirk Massachusetts Institute of Technology. Research Laboratory of Electronics © 2020, The Author(s). Quantum key distribution (QKD) allows for secure communications safe against attacks by quantum computers. QKD protocols are performed by sending a sizeable, but finite, number of quantum signals between the distant parties involved. Many QKD experiments, however, predict their achievable key rates using asymptotic formulas, which assume the transmission of an infinite number of signals, partly because QKD proofs with finite transmissions (and finite-key lengths) can be difficult. Here we develop a robust numerical approach for calculating the key rates for QKD protocols in the finite-key regime in terms of two semi-definite programs (SDPs). The first uses the relation between conditional smooth min-entropy and quantum relative entropy through the quantum asymptotic equipartition property, and the second uses the relation between the smooth min-entropy and quantum fidelity. The numerical programs are formulated under the assumption of collective attacks from the eavesdropper and can be promoted to withstand coherent attacks using the postselection technique. We then solve these SDPs using convex optimization solvers and obtain numerical calculations of finite-key rates for several protocols difficult to analyze analytically, such as BB84 with unequal detector efficiencies, B92, and twin-field QKD. Our numerical approach democratizes the composable security proofs for QKD protocols where the derived keys can be used as an input to another cryptosystem. 2022-06-22T16:09:24Z 2022-06-22T16:09:24Z 2020 2022-06-22T15:51:22Z Article http://purl.org/eprint/type/JournalArticle https://hdl.handle.net/1721.1/143531 Bunandar, Darius, Govia, Luke CG, Krovi, Hari and Englund, Dirk. 2020. "Numerical finite-key analysis of quantum key distribution." npj Quantum Information, 6 (1). en 10.1038/S41534-020-00322-W npj Quantum Information Creative Commons Attribution 4.0 International license https://creativecommons.org/licenses/by/4.0/ application/pdf Springer Science and Business Media LLC Nature
spellingShingle Bunandar, Darius
Govia, Luke CG
Krovi, Hari
Englund, Dirk
Numerical finite-key analysis of quantum key distribution
title Numerical finite-key analysis of quantum key distribution
title_full Numerical finite-key analysis of quantum key distribution
title_fullStr Numerical finite-key analysis of quantum key distribution
title_full_unstemmed Numerical finite-key analysis of quantum key distribution
title_short Numerical finite-key analysis of quantum key distribution
title_sort numerical finite key analysis of quantum key distribution
url https://hdl.handle.net/1721.1/143531
work_keys_str_mv AT bunandardarius numericalfinitekeyanalysisofquantumkeydistribution
AT govialukecg numericalfinitekeyanalysisofquantumkeydistribution
AT krovihari numericalfinitekeyanalysisofquantumkeydistribution
AT englunddirk numericalfinitekeyanalysisofquantumkeydistribution