{"title":"离散相位随机 BB84 协议的有限密钥分析","authors":"Xiao-Hang Jin, Zhen-Qiang Yin, Shuang Wang, Wei Chen, Guang-Can Guo, Zheng-Fu Han","doi":"10.1007/s11128-024-04520-9","DOIUrl":null,"url":null,"abstract":"<div><p>Quantum key distribution (QKD) is a secure communication method that relies on the inherent randomness of quantum mechanics to ensure information-theoretic security. The first and most widely used QKD protocol is BB84, and the proof of BB84’s security is vital. The discrete phase randomized BB84 protocol is a variant of the decoy BB84 protocol. It has been proven to be promising in the development of high-speed QKD systems. However, it still lacks an analysis with a finite number of pulses. This paper presents a comprehensive security analysis of the discrete phase BB84 protocol, using two different methods under different conditions. The analysis involves simulations and optimizations to determine the optimal parameter settings. It is confirmed that for a small number of finite pulses, i.e., <span>\\(10^7\\)</span>, if the number of discrete phases exceeds 30, one can calculate the key rate by assuming that a continuous phase randomization process was in operation. On the other hand, for a relatively smaller number of discrete values, i.e., 16 discrete phases, we have developed a numerical method to calculate the key rate. We have confirmed that its performance is reduced but still acceptable with a finite number of pulses.</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":null,"pages":null},"PeriodicalIF":2.2000,"publicationDate":"2024-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Finite key analysis for discrete phase randomized BB84 protocol\",\"authors\":\"Xiao-Hang Jin, Zhen-Qiang Yin, Shuang Wang, Wei Chen, Guang-Can Guo, Zheng-Fu Han\",\"doi\":\"10.1007/s11128-024-04520-9\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><p>Quantum key distribution (QKD) is a secure communication method that relies on the inherent randomness of quantum mechanics to ensure information-theoretic security. The first and most widely used QKD protocol is BB84, and the proof of BB84’s security is vital. The discrete phase randomized BB84 protocol is a variant of the decoy BB84 protocol. It has been proven to be promising in the development of high-speed QKD systems. However, it still lacks an analysis with a finite number of pulses. This paper presents a comprehensive security analysis of the discrete phase BB84 protocol, using two different methods under different conditions. The analysis involves simulations and optimizations to determine the optimal parameter settings. It is confirmed that for a small number of finite pulses, i.e., <span>\\\\(10^7\\\\)</span>, if the number of discrete phases exceeds 30, one can calculate the key rate by assuming that a continuous phase randomization process was in operation. On the other hand, for a relatively smaller number of discrete values, i.e., 16 discrete phases, we have developed a numerical method to calculate the key rate. We have confirmed that its performance is reduced but still acceptable with a finite number of pulses.</p></div>\",\"PeriodicalId\":746,\"journal\":{\"name\":\"Quantum Information Processing\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":2.2000,\"publicationDate\":\"2024-08-31\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Quantum Information Processing\",\"FirstCategoryId\":\"101\",\"ListUrlMain\":\"https://link.springer.com/article/10.1007/s11128-024-04520-9\",\"RegionNum\":3,\"RegionCategory\":\"物理与天体物理\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"PHYSICS, MATHEMATICAL\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Quantum Information Processing","FirstCategoryId":"101","ListUrlMain":"https://link.springer.com/article/10.1007/s11128-024-04520-9","RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"PHYSICS, MATHEMATICAL","Score":null,"Total":0}
Finite key analysis for discrete phase randomized BB84 protocol
Quantum key distribution (QKD) is a secure communication method that relies on the inherent randomness of quantum mechanics to ensure information-theoretic security. The first and most widely used QKD protocol is BB84, and the proof of BB84’s security is vital. The discrete phase randomized BB84 protocol is a variant of the decoy BB84 protocol. It has been proven to be promising in the development of high-speed QKD systems. However, it still lacks an analysis with a finite number of pulses. This paper presents a comprehensive security analysis of the discrete phase BB84 protocol, using two different methods under different conditions. The analysis involves simulations and optimizations to determine the optimal parameter settings. It is confirmed that for a small number of finite pulses, i.e., \(10^7\), if the number of discrete phases exceeds 30, one can calculate the key rate by assuming that a continuous phase randomization process was in operation. On the other hand, for a relatively smaller number of discrete values, i.e., 16 discrete phases, we have developed a numerical method to calculate the key rate. We have confirmed that its performance is reduced but still acceptable with a finite number of pulses.
期刊介绍:
Quantum Information Processing is a high-impact, international journal publishing cutting-edge experimental and theoretical research in all areas of Quantum Information Science. Topics of interest include quantum cryptography and communications, entanglement and discord, quantum algorithms, quantum error correction and fault tolerance, quantum computer science, quantum imaging and sensing, and experimental platforms for quantum information. Quantum Information Processing supports and inspires research by providing a comprehensive peer review process, and broadcasting high quality results in a range of formats. These include original papers, letters, broadly focused perspectives, comprehensive review articles, book reviews, and special topical issues. The journal is particularly interested in papers detailing and demonstrating quantum information protocols for cryptography, communications, computation, and sensing.