schliessen

Filtern

 

Bibliotheken

Security of biased bb84 quantum key distribution with finite resource

In the original BB84 quantum key distribution protocol, the states are prepared and measured randomly, which lose the unmatched detection results. To improve the sifting efficiency, biased bases selection BB84 protocol is proposed. Meanwhile, a practical quantum key distribution protocol can only tr... Full description

Journal Title: Chinese Physics B 2014, Vol.23(10), p.100304 (8pp)
Main Author: Zhao, Liang-Yuan
Other Authors: Li, Hong-Wei , Yin, Zhen-Qiang , Chen, Wei , You, Juan , Han, Zheng-Fu
Format: Electronic Article Electronic Article
Language: English
Subjects:
ID: ISSN: 1674-1056 ; E-ISSN: ; DOI: 10.1088/1674-1056/23/10/100304
Link: http://dx.doi.org/10.1088/1674-1056/23/10/100304
Zum Text:
SendSend as email Add to Book BagAdd to Book Bag
Staff View
recordid: iop10.1088/1674-1056/23/10/100304
title: Security of biased bb84 quantum key distribution with finite resource
format: Article
creator:
  • Zhao, Liang-Yuan
  • Li, Hong-Wei
  • Yin, Zhen-Qiang
  • Chen, Wei
  • You, Juan
  • Han, Zheng-Fu
subjects:
  • Security
  • Decoys
  • Qubits (Quantum Computing)
  • Quantum Cryptography
  • Fluctuation
  • Screening (Sizing)
  • Error Analysis
  • Sifting
  • Mathematical Analysis
  • Solid State Milieux (General) (So)
  • Physics (General) (Ah)
  • Biased Basis Selection
  • Security Bound
  • Quantum Key Distribution
ispartof: Chinese Physics B, 2014, Vol.23(10), p.100304 (8pp)
description: In the original BB84 quantum key distribution protocol, the states are prepared and measured randomly, which lose the unmatched detection results. To improve the sifting efficiency, biased bases selection BB84 protocol is proposed. Meanwhile, a practical quantum key distribution protocol can only transmit a finite number of signals, resulting in keys of finite length. The previous techniques for finite-key analysis focus mainly on the statistical fluctuations of the error rates and yields of the qubits. However, the prior choice probabilities of the two bases also have fluctuations by taking into account the finite-size effect. In this paper, we discuss the security of biased decoy state BB84 protocol with finite resources by considering all of the statistical fluctuations. The results can be directly used in the experimental realizations.
language: eng
source:
identifier: ISSN: 1674-1056 ; E-ISSN: ; DOI: 10.1088/1674-1056/23/10/100304
fulltext: no_fulltext
issn:
  • 1674-1056
  • 16741056
url: Link


@attributes
ID237711524
RANK0.07
NO1
SEARCH_ENGINEprimo_central_multiple_fe
SEARCH_ENGINE_TYPEPrimo Central Search Engine
LOCALfalse
PrimoNMBib
record
control
sourcerecordid10.1088/1674-1056/23/10/100304
sourceidiop
recordidTN_iop10.1088/1674-1056/23/10/100304
sourcesystemPC
pqid1753502862
display
typearticle
titleSecurity of biased bb84 quantum key distribution with finite resource
creatorZhao, Liang-Yuan ; Li, Hong-Wei ; Yin, Zhen-Qiang ; Chen, Wei ; You, Juan ; Han, Zheng-Fu
ispartofChinese Physics B, 2014, Vol.23(10), p.100304 (8pp)
identifier
descriptionIn the original BB84 quantum key distribution protocol, the states are prepared and measured randomly, which lose the unmatched detection results. To improve the sifting efficiency, biased bases selection BB84 protocol is proposed. Meanwhile, a practical quantum key distribution protocol can only transmit a finite number of signals, resulting in keys of finite length. The previous techniques for finite-key analysis focus mainly on the statistical fluctuations of the error rates and yields of the qubits. However, the prior choice probabilities of the two bases also have fluctuations by taking into account the finite-size effect. In this paper, we discuss the security of biased decoy state BB84 protocol with finite resources by considering all of the statistical fluctuations. The results can be directly used in the experimental realizations.
languageeng
source
subjectSecurity ; Decoys ; Qubits (Quantum Computing) ; Quantum Cryptography ; Fluctuation ; Screening (Sizing) ; Error Analysis ; Sifting ; Mathematical Analysis ; Solid State Milieux (General) (So) ; Physics (General) (Ah) ; Biased Basis Selection ; Security Bound ; Quantum Key Distribution;
version3
lds50peer_reviewed
links
openurl$$Topenurl_article
backlink$$Uhttp://dx.doi.org/10.1088/1674-1056/23/10/100304$$EView_record_in_IOPscience
openurlfulltext$$Topenurlfull_article
search
creatorcontrib
0Zhao, Liang-Yuan
1Li, Hong-Wei
2Yin, Zhen-Qiang
3Chen, Wei
4You, Juan
5Han, Zheng-Fu
titleSecurity of biased BB84 quantum key distribution with finite resource
descriptionIn the original BB84 quantum key distribution protocol, the states are prepared and measured randomly, which lose the unmatched detection results. To improve the sifting efficiency, biased bases selection BB84 protocol is proposed. Meanwhile, a practical quantum key distribution protocol can only transmit a finite number of signals, resulting in keys of finite length. The previous techniques for finite-key analysis focus mainly on the statistical fluctuations of the error rates and yields of the qubits. However, the prior choice probabilities of the two bases also have fluctuations by taking into account the finite-size effect. In this paper, we discuss the security of biased decoy state BB84 protocol with finite resources by considering all of the statistical fluctuations. The results can be directly used in the experimental realizations.
general
010.1088/1674-1056/23/10/100304
1English
2IOPscience (IOP Publishing)
3Chinese Physics B
sourceidiop
recordidiop10.1088/1674-1056/23/10/100304
issn
01674-1056
116741056
rsrctypearticle
creationdate2014
recordtypearticle
addtitleChinese Physics B
searchscope
0iop_rs
1iop
scope
0iop_rs
1iop
lsr30VSR-Enriched:[subject, pqid, eissn]
sort
titleSecurity of biased bb84 quantum key distribution with finite resource
creationdate20141001
authorZhao, Liang-Yuan ; Li, Hong-Wei ; Yin, Zhen-Qiang ; Chen, Wei ; You, Juan ; Han, Zheng-Fu
facets
frbrgroupid9213515201151683498
frbrtype5
languageeng
creationdate2014
collectionIOPscience (Institute of Physics)
prefilterarticles
rsrctypearticles
creatorcontrib
0Zhao, Liang-Yuan
1Li, Hong-Wei
2Yin, Zhen-Qiang
3Chen, Wei
4You, Juan
5Han, Zheng-Fu
jtitleChinese Physics B
toplevelpeer_reviewed
delivery
delcategoryRemote Search Resource
fulltextno_fulltext
addata
aulast
0Zhao
1Li
2Yin
3Chen
4You
5Han
aufirst
0Liang-Yuan
1Hong-Wei
2Zhen-Qiang
3Wei
4Juan
5Zheng-Fu
au
0Zhao, Liang-Yuan
1Li, Hong-Wei
2Yin, Zhen-Qiang
3Chen, Wei
4You, Juan
5Han, Zheng-Fu
atitleSecurity of biased BB84 quantum key distribution with finite resource
jtitleChinese Physics B
risdate20141001
volume23
issue10
spage100304
pages8
issn1674-1056
formatjournal
genrearticle
ristypeJOUR
abstractIn the original BB84 quantum key distribution protocol, the states are prepared and measured randomly, which lose the unmatched detection results. To improve the sifting efficiency, biased bases selection BB84 protocol is proposed. Meanwhile, a practical quantum key distribution protocol can only transmit a finite number of signals, resulting in keys of finite length. The previous techniques for finite-key analysis focus mainly on the statistical fluctuations of the error rates and yields of the qubits. However, the prior choice probabilities of the two bases also have fluctuations by taking into account the finite-size effect. In this paper, we discuss the security of biased decoy state BB84 protocol with finite resources by considering all of the statistical fluctuations. The results can be directly used in the experimental realizations.
doi10.1088/1674-1056/23/10/100304
eissn17414199
date2014-10-01