Finite-key analysis for quantum key distribution with weak coherent pulses based on Bernoulli sampling

An essential step in quantum key distribution is the estimation of parameters related to the leaked amount of information, which is usually done by sampling of the communication data. When the data size is finite, the final key rate depends on how the estimation process handles statistical fluctuations. Many of the present security analyses are based on the method with simple random sampling, where hypergeometric distribution or its known bounds are used for the estimation. Here we propose a concise method based on Bernoulli sampling, which is related to binomial distribution. Our method is suitable for the BB84 protocol with weak coherent pulses, reducing the number of estimated parameters to achieve a higher key generation rate compared to the method with simple random sampling. We also applied the method to prove the security of the differential-quadrature-phase-shift (DQPS) protocol in the finite-key regime. The result indicates that, the advantage of the DQPS protocol over the phase-encoding BB84 protocol in terms of the key rate, which was previously confirmed in the asymptotic regime, persists in the finite-key regime.

[1]  H. Chernoff A Measure of Asymptotic Efficiency for Tests of a Hypothesis Based on the sum of Observations , 1952 .

[2]  Marco Tomamichel,et al.  Tight finite-key analysis for quantum cryptography , 2011, Nature Communications.

[3]  Mario Berta,et al.  Continuous variable quantum key distribution: finite-key analysis of composable security against coherent attacks. , 2012 .

[4]  Lo,et al.  Unconditional security of quantum key distribution over arbitrarily long distances , 1999, Science.

[5]  Kyo Inoue,et al.  Differential-quadrature-phase-shift quantum key distribution , 2009 .

[6]  Xiang‐Bin Wang,et al.  Beating the PNS attack in practical quantum cryptography , 2004 .

[7]  Akihiro Mizutani,et al.  Finite-key security analysis of quantum key distribution with imperfect light sources , 2015, 1504.08151.

[8]  Xiongfeng Ma,et al.  Decoy state quantum key distribution. , 2004, Physical review letters.

[9]  O. William Journal Of The American Statistical Association V-28 , 1932 .

[10]  Won-Young Hwang Quantum key distribution with high loss: toward global secure communication. , 2003, Physical review letters.

[11]  Feihu Xu,et al.  Concise security bounds for practical decoy-state quantum key distribution , 2013, 1311.7129.

[12]  Wei Cui,et al.  Finite-key analysis for measurement-device-independent quantum key distribution , 2013, Nature Communications.

[13]  Shor,et al.  Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.

[14]  Masato Koashi,et al.  Security of the differential-quadrature-phase-shift quantum key distribution , 2016 .

[15]  J. Ahrens A Comparison of Hypergeometric Distributions with Corresponding Binomial Distributions , 1987 .

[16]  Valerio Scarani,et al.  Finite-key analysis for practical implementations of quantum key distribution , 2008, 0811.2628.

[17]  Salil P. Vadhan,et al.  Theory of Cryptography , 2016, Lecture Notes in Computer Science.

[18]  Ericka Stricklin-Parker,et al.  Ann , 2005 .

[19]  John Preskill,et al.  Security of quantum key distribution with imperfect devices , 2002, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..

[20]  Hoi-Kwong Lo,et al.  Efficient Quantum Key Distribution Scheme and a Proof of Its Unconditional Security , 2004, Journal of Cryptology.

[21]  Normand J. Beaudry,et al.  Squashing models for optical measurements in quantum communication. , 2008, Physical review letters.

[22]  Patrick J. Coles,et al.  Sifting attacks in finite-size quantum key distribution , 2015, 1506.07502.

[23]  M. Hayashi,et al.  Security analysis of the decoy method with the Bennett–Brassard 1984 protocol for finite key lengths , 2013, 1302.4139.

[24]  Charles H. Bennett,et al.  Quantum cryptography without Bell's theorem. , 1992, Physical review letters.

[25]  Masato Koashi,et al.  Simple security proof of quantum key distribution based on complementarity , 2009 .

[26]  James F. Dynes,et al.  Security Bounds for Efficient Decoy-State Quantum Key Distribution , 2015, IEEE Journal of Selected Topics in Quantum Electronics.