Quantum key distribution with finite resources: Secret key rates via Renyi entropies

A realistic quantum key distribution (QKD) protocol necessarily deals with finite resources, such as the number of signals exchanged by the two parties. We derive a bound on the secret key rate which is expressed as an optimization problem over Renyi entropies. Under the assumption of collective attacks by an eavesdropper, a computable estimate of our bound for the six-state protocol is provided. This bound leads to improved key rates in comparison to previous results.

[1]  Robert König,et al.  The Operational Meaning of Min- and Max-Entropy , 2008, IEEE Transactions on Information Theory.

[2]  Matthias Christandl,et al.  Postselection technique for quantum channels with applications to quantum cryptography. , 2008, Physical review letters.

[3]  Zheng-Fu Han,et al.  Security of decoy states QKD with finite resources against collective attacks , 2009 .

[4]  Todd D. Plantenga,et al.  HOPSPACK 2.0 user manual. , 2009 .

[5]  Valerio Scarani,et al.  Finite-key analysis for practical implementations of quantum key distribution , 2008, 0811.2628.

[6]  Larry Carter,et al.  Universal Classes of Hash Functions , 1979, J. Comput. Syst. Sci..

[7]  Hoi-Kwong Lo,et al.  Efficient Quantum Key Distribution Scheme and a Proof of Its Unconditional Security , 2004, Journal of Cryptology.

[8]  Renato Renner,et al.  Quantum cryptography with finite resources: unconditional security bound for discrete-variable protocols with one-way postprocessing. , 2007, Physical review letters.

[9]  Andrew J. Shields,et al.  Key to the quantum industry , 2007 .

[10]  D. Bruß Optimal Eavesdropping in Quantum Cryptography with Six States , 1998, quant-ph/9805019.

[11]  V. Scarani,et al.  Finite-key security against coherent attacks in quantum key distribution , 2010, 1008.2596.

[12]  Jörn Müller-Quade,et al.  Composability in quantum cryptography , 2009, ArXiv.

[13]  B Kraus,et al.  Lower and upper bounds on the secret-key rate for quantum key distribution protocols using one-way classical communication. , 2004, Physical review letters.

[14]  R. Renner,et al.  Information-theoretic security proof for quantum-key-distribution protocols , 2005, quant-ph/0502064.

[15]  Marco Tomamichel,et al.  A Fully Quantum Asymptotic Equipartition Property , 2008, IEEE Transactions on Information Theory.

[16]  Hermann Kampermann,et al.  Min-entropy and quantum key distribution: Nonzero key rates for ``small'' numbers of signals , 2011 .

[17]  R. Renner,et al.  Uncertainty relation for smooth entropies. , 2010, Physical review letters.

[18]  Hoi-Kwong Lo,et al.  Proof of unconditional security of six-state quantum key distribution scheme , 2001, Quantum Inf. Comput..

[19]  D. Bruß,et al.  Finite key analysis for symmetric attacks in quantum key distribution (9 pages) , 2006, quant-ph/0607141.

[20]  H. Bechmann-Pasquinucci,et al.  Incoherent and coherent eavesdropping in the six-state protocol of quantum cryptography , 1998, quant-ph/9807041.

[21]  R. Renner,et al.  An information-theoretic security proof for QKD protocols , 2005, quant-ph/0502064.

[22]  V. Scarani,et al.  The security of practical quantum key distribution , 2008, 0802.4155.

[23]  Dominic Mayers,et al.  Unconditional security in quantum cryptography , 1998, JACM.