arXiv Analytics

Sign in

arXiv:0806.0120 [quant-ph]AbstractReferencesReviewsResources

Security Bounds for Quantum Cryptography with Finite Resources

Valerio Scarani, Renato Renner

Published 2008-06-01Version 1

A practical quantum key distribution (QKD) protocol necessarily runs in finite time and, hence, only a finite amount of communication is exchanged. This is in contrast to most of the standard results on the security of QKD, which only hold in the limit where the number of transmitted signals approaches infinity. Here, we analyze the security of QKD under the realistic assumption that the amount of communication is finite. At the level of the general formalism, we present new results that help simplifying the actual implementation of QKD protocols: in particular, we show that symmetrization steps, which are required by certain security proofs (e.g., proofs based on de Finetti's representation theorem), can be omitted in practical implementations. Also, we demonstrate how two-way reconciliation protocols can be taken into account in the security analysis. At the level of numerical estimates, we present the bounds with finite resources for ``device-independent security'' against collective attacks.

Journal: Proceedings of TQC2008, Lecture Notes in Computer Science 5106 (Springer Verlag, Berlin), pp. 83-95 (2008)
Categories: quant-ph
Related articles: Most relevant | Search more
arXiv:quant-ph/9910095 (Published 1999-10-22)
Quantum Cryptography using larger alphabets
arXiv:quant-ph/9701039 (Published 1997-01-30)
Optimal Eavesdropping in Quantum Cryptography. I
arXiv:1105.5574 [quant-ph] (Published 2011-05-27)
QKD with finite resources: secret key rates via Rényi entropies