Asymmetric "4+2" protocol for quantum key distribution with finite resources

  • Authors:
  • Guodong Kang;Qingping Zhou;Maofa Fang;Yanliang Zhang

  • Affiliations:
  • Key Laboratory of Software Engineering of Ministry of Education, School of Software and Service Outsourcing, JiShou University, Zhangjiajie, China 427000;Key Laboratory of Software Engineering of Ministry of Education, School of Software and Service Outsourcing, JiShou University, Zhangjiajie, China 427000;Key Laboratory of Low-Dimensional Quantum Structures and Quantum Control of Ministry of Education, Department of Physics, Hunan Normal University, Changsha, China 410081;Key Laboratory of Software Engineering of Ministry of Education, School of Software and Service Outsourcing, JiShou University, Zhangjiajie, China 427000

  • Venue:
  • Quantum Information Processing
  • Year:
  • 2014

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper, we present an asymmetric "4+2" protocol for quantum key distribution with finite photon pulses. The main work of this paper focuses on the composable security proof for this protocol in a finite-key scenario. Based on the essence security basis of the original "4+2" protocol proposed by Huttner et al. (Phys Rev A 51(3):1863---1869, 1995), we first develop the squashing model for this protocol with the quantum non-demolition measure theory. From this model, against the collective photon-number-splitting attack, we then provide the security proof (formulas of finite-key security bounds) for this protocol. The expected performance of this protocol are also evaluated on a priori reasonable expected values of parameters. Our work shows that the performance we derived is the lower one and it can cover long distances in the lossy channel.