2020
DOI: 10.1038/s41534-020-00322-w
|View full text |Cite
|
Sign up to set email alerts
|

Numerical finite-key analysis of quantum key distribution

Abstract: Quantum key distribution (QKD) allows for secure communications safe against attacks by quantum computers. QKD protocols are performed by sending a sizeable, but finite, number of quantum signals between the distant parties involved. Many QKD experiments, however, predict their achievable key rates using asymptotic formulas, which assume the transmission of an infinite number of signals, partly because QKD proofs with finite transmissions (and finite-key lengths) can be difficult. Here we develop a robust nume… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
18
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
5

Relationship

0
10

Authors

Journals

citations
Cited by 26 publications
(20 citation statements)
references
References 56 publications
0
18
0
Order By: Relevance
“…The future works include the optimization of the key rate of the discrete-modulation protocol in the short distance transmission by extending current state constellation or other new constellation design schemes [52], and finding better data postselection strategies [53,54]. Extending our security analysis to include the impact of finite-size is also an important future task [55][56][57]. In Fig.…”
Section: Discussionmentioning
confidence: 99%
“…The future works include the optimization of the key rate of the discrete-modulation protocol in the short distance transmission by extending current state constellation or other new constellation design schemes [52], and finding better data postselection strategies [53,54]. Extending our security analysis to include the impact of finite-size is also an important future task [55][56][57]. In Fig.…”
Section: Discussionmentioning
confidence: 99%
“…As a result, most of the current numerical methods can only deal with the asymptotic security. Recently, there are two studies for the finite-size case that only carried out numerical analysis against collective attacks [23,24]. The work [24] also considers a possible extension to general attacks.…”
Section: Introductionmentioning
confidence: 99%
“…For discretely modulated CV-QKD protocols, there are also security proofs against collective attacks in the asymptotic limit available [6][7][8]. Recent attempts [9][10][11] tackle the open problem of secure key rates in the finite-size regime.…”
Section: Introductionmentioning
confidence: 99%