2013
DOI: 10.1103/physreva.87.012315
|View full text |Cite
|
Sign up to set email alerts
|

Secret key rates for coherent attacks

Abstract: We develop a new method to quantify the secret key rate for permutation-invariant protocols for coherent attacks and finite resources. The method reduces the calculation of secret key rates for coherent attacks to the calculation for collective attacks by bounding the smooth min-entropy of permutation-invariant states via the smooth min-entropy of corresponding tensor-product states. The comparison of the results to the well-known post-selection technique for the BB84 and six-state protocol shows the high rele… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
10
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
8

Relationship

1
7

Authors

Journals

citations
Cited by 10 publications
(10 citation statements)
references
References 27 publications
(55 reference statements)
0
10
0
Order By: Relevance
“…If the main homodyne detector H the monitoring detector H ′ (see Fig. 4) are both imperfect with loss η D and noise of the variance V D , which is coupled to the signal with the ratio η D [40], then the quadratures measured by the detectors H and H ′ will be given by 15) and 16) respectively, where x 1 and x 2 are the quadrature values associated with the detector noise such that V ar(x 1 ) = V ar(x 2 ) ≡ V D . The weighted difference ∆x = gx ′ B − g ′ x ′ SCB will then be given by…”
Section: Appendix: Security Analysis Is Detailmentioning
confidence: 99%
See 1 more Smart Citation
“…If the main homodyne detector H the monitoring detector H ′ (see Fig. 4) are both imperfect with loss η D and noise of the variance V D , which is coupled to the signal with the ratio η D [40], then the quadratures measured by the detectors H and H ′ will be given by 15) and 16) respectively, where x 1 and x 2 are the quadrature values associated with the detector noise such that V ar(x 1 ) = V ar(x 2 ) ≡ V D . The weighted difference ∆x = gx ′ B − g ′ x ′ SCB will then be given by…”
Section: Appendix: Security Analysis Is Detailmentioning
confidence: 99%
“…Recently, continuous-variable (CV) [3] protocols of QKD (see [4] for review) were developed and implemented on the basis of squeezed [5][6][7] or coherent [8][9][10][11][12] states. The security of CV QKD protocols in the case of Gaussian modulation was then shown against collective attacks in the presence of channel noise [13,14], which also implies the security against the most general coherent attacks [15,16].…”
Section: Introductionmentioning
confidence: 98%
“…Due to non-optimized decoy-state 2 It was conjectured that the mentioned proof method holds for general attacks too, not only for collective ones. Recently, an attempt to prove this conjecture was made in [48] and it was found that a few extra bits have to be sacrificed during privacy amplification to go from collective to general attacks. Table I.…”
Section: A State Of the Art And Comparisonmentioning
confidence: 99%
“…In the more general case of collective attacks it is assumed that Eve can store her ancillary states in a quantum memory and perform an optimized collective measurement on the set of states after the measurement bases are revealed by Alice and Bob. It was also recently shown that collective attacks are no less effective than the most general coherent attacks [46,47], which is also valid for continuousvariable protocols in the asymptotic regime [48]. Thus, we establish security against the individual attacks to analytically estimate the region where security is lost, since insecurity against individual attacks is a sufficient condition for insecurity of the protocol against more sophisticated attacks such as collective and coherent attacks.…”
Section: Security Analysismentioning
confidence: 99%