4.6 Article

Security analysis of the decoy method with the Bennett-Brassard 1984 protocol for finite key lengths

期刊

NEW JOURNAL OF PHYSICS
卷 16, 期 -, 页码 -

出版社

IOP PUBLISHING LTD
DOI: 10.1088/1367-2630/16/6/063009

关键词

decoy method; finite-key length; BB84 protocol; failure probability of phase error correction; interval estimation; per cent point

资金

  1. MEXT [23246071]
  2. National Institute of Information and Communication Technology (NICT), Japan
  3. Singapore Ministry of Education
  4. National Research Foundation
  5. Grants-in-Aid for Scientific Research [23246071] Funding Source: KAKEN

向作者/读者索取更多资源

This paper provides a formula for the sacrifice bit-length for privacy amplification with the Bennett-Brassard 1984 protocol for finite key lengths, when we employ the decoy method. Using the formula, we can guarantee the security parameter for a realizable quantum key distribution system. The key generation rates with finite key lengths are numerically evaluated. The proposed method improves the existing key generation rate even in the asymptotic setting.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据