Finite-key analysis for quantum key distribution with decoy states

  • Authors:
  • Ting-Ting Song;Jie Zhang;Su-Juan Qin;Qiao-Yan Wen

  • Affiliations:
  • State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China and State Key Laboratory of Integrated Services Network, Xidian Univ ...;School of Science, Beijing University of Posts and Telecommunications, Beijing, China;State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China;State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, China

  • Venue:
  • Quantum Information & Computation
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

We analyze the security of finite-resource quantum key distribution with decoy states, and present the security bound for the practical implementations by introducing the deviations of the probability of sending a k-photon pulse and the error rate of the quantum state. The bound is simulated under reasonable values of the observed parameters. Compared with the previous works, the security bound is more stringent.