期刊
NATURE COMMUNICATIONS
卷 5, 期 -, 页码 -出版社
NATURE PUBLISHING GROUP
DOI: 10.1038/ncomms4732
关键词
-
资金
- Paul Biringer Graduate Scholarship
- European Regional Development Fund (ERDF)
- Galician Regional Government [CN2012/279, CN 2012/260]
- NSERC
- CRC program
- National Centre of Competence in Research QSIT
- Swiss NanoTera project QCRYPT
- FP7 Marie-Curie IAAP QCERT
- CHIST-ERA
- DIQIP
- Secure photonic network technology
- UQCC
- National Institute of Information and Communications Technology (NICT) of Japan
- Japan Society for the Promotion of Science (JSPS) through World-Leading Innovative R&D on Science and Technology
Quantum key distribution promises unconditionally secure communications. However, as practical devices tend to deviate from their specifications, the security of some practical systems is no longer valid. In particular, an adversary can exploit imperfect detectors to learn a large part of the secret key, even though the security proof claims otherwise. Recently, a practical approach-measurement-device-independent quantum key distribution-has been proposed to solve this problem. However, so far its security has only been fully proven under the assumption that the legitimate users of the system have unlimited resources. Here we fill this gap and provide a rigorous security proof against general attacks in the finite-key regime. This is obtained by applying large deviation theory, specifically the Chernoff bound, to perform parameter estimation. For the first time we demonstrate the feasibility of long-distance implementations of measurement-device-independent quantum key distribution within a reasonable time frame of signal transmission.
作者
我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。
推荐
暂无数据