Papers
Topics
Authors
Recent
2000 character limit reached

Security Of Finite-Key-Length Measurement-Device-Independent Quantum Key Distribution Using Arbitrary Number Of Decoys (2003.08549v2)

Published 19 Mar 2020 in quant-ph

Abstract: In quantum key distribution, measurement-device-independent and decoy-state techniques enable the two cooperative agents to establish a shared secret key using imperfect measurement devices and weak Poissonian sources, respectively. Investigations so far are not comprehensive as they restrict to less than or equal to four decoy states. Moreover, many of them involves pure numerical studies. Here I report a general security proof that works for any fixed number of decoy states and any fixed raw key length. The two key ideas involved here. The first one is the repeated application of the inversion formula for Vandermonde matrix to obtain various bounds on certain yields and error rates. The second one is the use of a recently proven generalization of the McDiarmid inequality. These techniques rise the best provably secure key rate of the measurement-device-independent version of the BB84 scheme by at least 1.25 times and increase the workable distance between the two cooperative agents from slightly less than 60 km to slightly greater than 130 km in case there are $10{10}$ photon pulse pair sent without a quantum repeater.

Summary

We haven't generated a summary for this paper yet.

Whiteboard

Open Problems

We haven't generated a list of open problems mentioned in this paper yet.

Continue Learning

We haven't generated follow-up questions for this paper yet.

Authors (1)

Collections

Sign up for free to add this paper to one or more collections.