Security of biased BB84 quantum key distribution with finite resource
In the original BB84 quantum key distribution protocol, the states are prepared and measured randomly, which lose the unmatched detection results. To improve the sifting efficiency, biased bases selection BB84 protocol is proposed. Meanwhile, a practical quantum key distribution protocol can only tr...
Saved in:
Published in | Chinese physics B Vol. 23; no. 10; pp. 24 - 31 |
---|---|
Main Author | |
Format | Journal Article |
Language | English |
Published |
01.10.2014
|
Subjects | |
Online Access | Get full text |
ISSN | 1674-1056 2058-3834 1741-4199 |
DOI | 10.1088/1674-1056/23/10/100304 |
Cover
Summary: | In the original BB84 quantum key distribution protocol, the states are prepared and measured randomly, which lose the unmatched detection results. To improve the sifting efficiency, biased bases selection BB84 protocol is proposed. Meanwhile, a practical quantum key distribution protocol can only transmit a finite number of signals, resulting in keys of finite length. The previous techniques for finite-key analysis focus mainly on the statistical fluctuations of the error rates and yields of the qubits. However, the prior choice probabilities of the two bases also have fluctuations by taking into account the finite-size effect. In this paper, we discuss the security of biased decoy state BB84 protocol with finite resources by considering all of the statistical fluctuations. The results can be directly used in the experimental realizations. |
---|---|
Bibliography: | Zhao Liang-Yuan, Li Hong-Wei, Yin Zhen-Qiang, Chen Wei, You Juan, and Han Zheng-Fu( a) Key Laboratory of Quantum Information, University of Science and Technology of China, Hefei 230026, China b) Synergetic Innovation Center of Quantum Information & Quantum Physics, University of Science and Technology of China, Hefei 230026, China c) zhengzhou Information Science and Technology Institute, Zhengzhou 450004, China In the original BB84 quantum key distribution protocol, the states are prepared and measured randomly, which lose the unmatched detection results. To improve the sifting efficiency, biased bases selection BB84 protocol is proposed. Meanwhile, a practical quantum key distribution protocol can only transmit a finite number of signals, resulting in keys of finite length. The previous techniques for finite-key analysis focus mainly on the statistical fluctuations of the error rates and yields of the qubits. However, the prior choice probabilities of the two bases also have fluctuations by taking into account the finite-size effect. In this paper, we discuss the security of biased decoy state BB84 protocol with finite resources by considering all of the statistical fluctuations. The results can be directly used in the experimental realizations. biased basis selection, security bound, quantum key distribution 11-5639/O4 ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 23 |
ISSN: | 1674-1056 2058-3834 1741-4199 |
DOI: | 10.1088/1674-1056/23/10/100304 |