메뉴 건너뛰기




Volumn 5, Issue , 2014, Pages

Finite-key analysis for measurement-device-independent quantum key distribution

Author keywords

[No Author keywords available]

Indexed keywords

ANALYSIS; ARTICLE; COMPUTER SECURITY; DIODE LASER; FEASIBILITY STUDY; MEASUREMENT; MEASUREMENT DEVICE INDEPENDENT QUANTUM KEY DISTRIBUTION; PERFORMANCE; POLARIZATION; PROBABILITY; QUANTUM MECHANICS; SIGNAL PROCESSING; QUANTUM THEORY; TELECOMMUNICATION; THEORETICAL MODEL;

EID: 84899852555     PISSN: None     EISSN: 20411723     Source Type: Journal    
DOI: 10.1038/ncomms4732     Document Type: Article
Times cited : (439)

References (53)
  • 1
    • 0036013605 scopus 로고    scopus 로고
    • Quantum cryptography
    • Gisin, N. et al. Quantum cryptography. Rev. Mod. Phys. 74, 145-195 (2002).
    • (2002) Rev. Mod. Phys. , vol.74 , pp. 145-195
    • Gisin, N.1
  • 2
    • 70449402318 scopus 로고    scopus 로고
    • The security of practical quantum key distribution
    • Scarani, V. et al. The security of practical quantum key distribution. Rev. Mod. Phys. 81, 1301-1350 (2009).
    • (2009) Rev. Mod. Phys. , vol.81 , pp. 1301-1350
    • Scarani, V.1
  • 3
    • 33846202211 scopus 로고    scopus 로고
    • Time-shift attack in practical quantum cryptosystems
    • Qi, B. et al. Time-shift attack in practical quantum cryptosystems. Quantum Inf. Comput. 7, 73-82 (2007).
    • (2007) Quantum Inf. Comput. , vol.7 , pp. 73-82
    • Qi, B.1
  • 4
    • 33947205243 scopus 로고    scopus 로고
    • Phase-remapping attack in practical quantum-keydistribution systems
    • Fung, C.-H. F. et al. Phase-remapping attack in practical quantum-keydistribution systems. Phys. Rev. A 75, 032314 (2007).
    • (2007) Phys. Rev. A , vol.75 , pp. 032314
    • Fung, C.-H.F.1
  • 5
    • 34547403333 scopus 로고    scopus 로고
    • Breaking a quantum key distribution system through a timing side channel
    • Lamas-Linares, A. & Kurtsiefer, C. Breaking a quantum key distribution system through a timing side channel. Opt. Express 15, 9388-9393 (2007).
    • (2007) Opt. Express , vol.15 , pp. 9388-9393
    • Lamas-Linares, A.1    Kurtsiefer, C.2
  • 6
    • 55049100546 scopus 로고    scopus 로고
    • Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems
    • Zhao, Y. et al. Quantum hacking: experimental demonstration of time-shift attack against practical quantum-key-distribution systems. Phys. Rev. A 78, 042333 (2008).
    • (2008) Phys. Rev. A , vol.78 , pp. 042333
    • Zhao, Y.1
  • 7
    • 67650091527 scopus 로고    scopus 로고
    • Information leakage via side channels in freespace BB84 quantum cryptography
    • Nauerth, S. et al. Information leakage via side channels in freespace BB84 quantum cryptography. New J. Phys. 11, 065001 (2009).
    • (2009) New J. Phys. , vol.11 , pp. 065001
    • Nauerth, S.1
  • 8
    • 78650161554 scopus 로고    scopus 로고
    • Experimental demonstration of phase-remapping attack in a practical quantum key distribution system
    • Xu, F., Qi, B. & Lo, H.-K. Experimental demonstration of phase-remapping attack in a practical quantum key distribution system. New J. Phys. 12, 113026 (2010).
    • (2010) New J. Phys. , vol.12 , pp. 113026
    • Xu, F.1    Qi, B.2    Lo, H.-K.3
  • 9
    • 77957566438 scopus 로고    scopus 로고
    • Hacking commercial quantum cryptography systems by tailored bright illumination
    • Lydersen, L. et al. Hacking commercial quantum cryptography systems by tailored bright illumination. Nat. Photon. 4, 686-689 (2010).
    • (2010) Nat. Photon. , vol.4 , pp. 686-689
    • Lydersen, L.1
  • 10
    • 79959230884 scopus 로고    scopus 로고
    • Full-field implementation of a perfect eavesdropper on a quantum cryptography system
    • Gerhardt, I. et al. Full-field implementation of a perfect eavesdropper on a quantum cryptography system. Nat. Commun. 2, 349 (2011).
    • (2011) Nat. Commun. , vol.2 , pp. 349
    • Gerhardt, I.1
  • 11
    • 79960775427 scopus 로고    scopus 로고
    • Quantum eavesdropping without interception: An attack exploiting the dead time of single-photon detectors
    • Weier, H. et al. Quantum eavesdropping without interception: an attack exploiting the dead time of single-photon detectors. New J. Phys. 13, 073024 (2011).
    • (2011) New J. Phys. , vol.13 , pp. 073024
    • Weier, H.1
  • 13
    • 34547380185 scopus 로고    scopus 로고
    • Device-independent security of quantum cryptography against collective attacks
    • Acín, A. et al. Device-independent security of quantum cryptography against collective attacks. Phys. Rev. Lett. 98, 230501 (2007).
    • (2007) Phys. Rev. Lett. , vol.98 , pp. 230501
    • Acín, A.1
  • 14
    • 66549107253 scopus 로고    scopus 로고
    • Device-independent quantum key distribution secure against collective attacks
    • Pironio, S. et al. Device-independent quantum key distribution secure against collective attacks. New J. Phys. 11, 045021 (2009).
    • (2009) New J. Phys. , vol.11 , pp. 045021
    • Pironio, S.1
  • 15
    • 72149091696 scopus 로고    scopus 로고
    • Device independent quantum key distribution secure against coherent attacks with memoryless measurement devices
    • McKague, M. Device independent quantum key distribution secure against coherent attacks with memoryless measurement devices. New J. Phys. 11, 103037 (2009).
    • (2009) New J. Phys. , vol.11 , pp. 103037
    • McKague, M.1
  • 16
    • 79952712286 scopus 로고    scopus 로고
    • Secure device-independent quantum key distribution with causally independent measurement devices
    • Masanes, L., Pironio, S. & Acín, A. Secure device-independent quantum key distribution with causally independent measurement devices. Nat. Commun. 2, 238 (2011).
    • (2011) Nat. Commun. , vol.2 , pp. 238
    • Masanes, L.1    Pironio, S.2    Acín, A.3
  • 17
    • 84871796284 scopus 로고    scopus 로고
    • Memory attacks on device-independent quantum cryptography
    • Barrett, J., Colbeck, R. & Kent, A. Memory attacks on device-independent quantum cryptography. Phys. Rev. Lett. 110, 010503 (2013).
    • (2013) Phys. Rev. Lett. , vol.110 , pp. 010503
    • Barrett, J.1    Colbeck, R.2    Kent, A.3
  • 18
    • 0000486090 scopus 로고
    • On the einstein-podolsky-rosen paradox
    • Bell, J. S. On the Einstein-Podolsky-Rosen paradox. Physics 1, 195-200 (1964).
    • (1964) Physics , vol.1 , pp. 195-200
    • Bell, J.S.1
  • 19
    • 36049056258 scopus 로고
    • Proposed experiment to test local hidden-variable theories
    • Clauser, J. F. et al. Proposed experiment to test local hidden-variable theories. Phys. Rev. Lett. 23, 880-884 (1969).
    • (1969) Phys. Rev. Lett. , vol.23 , pp. 880-884
    • Clauser, J.F.1
  • 20
    • 33746933894 scopus 로고
    • Hidden-variable example based upon data rejection
    • Pearle, P. Hidden-variable example based upon data rejection. Phys. Rev. D 2, 1418-1425 (1970).
    • (1970) Phys. Rev. D , vol.2 , pp. 1418-1425
    • Pearle, P.1
  • 21
    • 77955640378 scopus 로고    scopus 로고
    • Proposal for implementing deviceindependent quantum key distribution based on a heralded qubit amplifier
    • Gisin, N., Pironio, S. & Sangouard, N. Proposal for implementing deviceindependent quantum key distribution based on a heralded qubit amplifier. Phys. Rev. Lett. 105, 070501 (2010).
    • (2010) Phys. Rev. Lett. , vol.105 , pp. 070501
    • Gisin, N.1    Pironio, S.2    Sangouard, N.3
  • 22
    • 79961079184 scopus 로고    scopus 로고
    • Heralded-qubit amplifiers for practical deviceindependent quantum key distribution
    • Curty, M. & Moroder, T. Heralded-qubit amplifiers for practical deviceindependent quantum key distribution. Phys. Rev. A 84, 010304(R) (2011).
    • (2011) Phys. Rev. A , vol.84 , pp. 010304
    • Curty, M.1    Moroder, T.2
  • 23
    • 84859361763 scopus 로고    scopus 로고
    • Measurement-device-independent quantum key distribution
    • Lo, H.-K., Curty, M. & Qi, B. Measurement-device-independent quantum key distribution. Phys. Rev. Lett. 108, 130503 (2012).
    • (2012) Phys. Rev. Lett. , vol.108 , pp. 130503
    • Lo, H.-K.1    Curty, M.2    Qi, B.3
  • 24
    • 84884679606 scopus 로고    scopus 로고
    • Real-world two-photon interference and proof-of-principle quantum key distribution immune to detector attacks
    • Rubenok, A. et al. Real-world two-photon interference and proof-of-principle quantum key distribution immune to detector attacks. Phys. Rev. Lett. 111, 130501 (2013).
    • (2013) Phys. Rev. Lett. , vol.111 , pp. 130501
    • Rubenok, A.1
  • 25
    • 84887554168 scopus 로고    scopus 로고
    • Proof-of-principle demonstration of measurement device independent QKD using polarization qubits
    • Ferreira da Silva, T. et al. Proof-of-principle demonstration of measurement device independent QKD using polarization qubits. Phys. Rev. A 88, 052303 (2013).
    • (2013) Phys. Rev. A , vol.88 , pp. 052303
    • Ferreira Da-Silva, T.1
  • 26
    • 84884686328 scopus 로고    scopus 로고
    • Experimental measurement-device-independent quantum key distribution
    • Liu, Y. et al. Experimental measurement-device-independent quantum key distribution. Phys. Rev. Lett. 111, 130502 (2013).
    • (2013) Phys. Rev. Lett. , vol.111 , pp. 130502
    • Liu, Y.1
  • 28
    • 3142519923 scopus 로고    scopus 로고
    • Entanglement as a precondition for secure quantum key distribution
    • Curty, M., Lewenstein, M. & Lütkenhaus, N. Entanglement as a precondition for secure quantum key distribution. Phys. Rev. Lett. 92, 217903 (2004).
    • (2004) Phys. Rev. Lett. , vol.92 , pp. 217903
    • Curty, M.1    Lewenstein, M.2    Lütkenhaus, N.3
  • 29
    • 84888383118 scopus 로고    scopus 로고
    • Device-independent quantum key distribution with local bell test
    • Lim, C. C. W. et al. Device-Independent quantum key distribution with local Bell test. Phys. Rev. X 3, 031006 (2013).
    • (2013) Phys. Rev. X , vol.3 , pp. 031006
    • Lim, C.C.W.1
  • 30
    • 84865644244 scopus 로고    scopus 로고
    • Finite-key analysis for measurement-device-independent quantum key distribution
    • Song, T.-T. et al. Finite-key analysis for measurement-device-independent quantum key distribution. Phys. Rev. A 86, 022332 (2012).
    • (2012) Phys. Rev. A , vol.86 , pp. 022332
    • Song, T.-T.1
  • 31
    • 84868359581 scopus 로고    scopus 로고
    • Statistical fluctuation analysis for measurement-device-independent quantum key distribution
    • Ma, X., Fung, C.-H. F. & Razavi, M. Statistical fluctuation analysis for measurement-device-independent quantum key distribution. Phys. Rev. A 86, 052305 (2012).
    • (2012) Phys. Rev. A , vol.86 , pp. 052305
    • Ma, X.1    Fung, C.-H.F.2    Razavi, M.3
  • 32
  • 33
    • 84884145066 scopus 로고    scopus 로고
    • Experimental quantum key distribution with finite-key security analysis for noisy channels
    • Bacco, D., Canale, M., Laurenti, N., Vallone, G. & Villoresi, P. Experimental quantum key distribution with finite-key security analysis for noisy channels. Nat. Commun. 4, 2363 (2013).
    • (2013) Nat. Commun. , vol.4 , pp. 2363
    • Bacco, D.1    Canale, M.2    Laurenti, N.3    Vallone, G.4    Villoresi, P.5
  • 34
    • 84894501687 scopus 로고    scopus 로고
    • Concise security bounds for practical decoy-state quantum key distribution
    • Lim, C. C. W., Curty, M., Walenta, N., Xu, F. & Zbinden, H. Concise security bounds for practical decoy-state quantum key distribution. Phys. Rev. A 89, 022307 (2014).
    • (2014) Phys. Rev. A , vol.89 , pp. 022307
    • Lim, C.C.W.1    Curty, M.2    Walenta, N.3    Xu, F.4    Zbinden, H.5
  • 36
    • 69249154272 scopus 로고    scopus 로고
    • Composability in quantum cryptography
    • Müller-Quade, J. & Renner, R. Composability in quantum cryptography. New J. Phys. 11, 085006 (2009).
    • (2009) New J. Phys. , vol.11 , pp. 085006
    • Müller-Quade, J.1    Renner, R.2
  • 37
    • 0000182415 scopus 로고
    • A measure of asymptotic efficiency for tests of a hypothesis based on the sum of observations
    • Chernoff, H. A measure of asymptotic efficiency for tests of a hypothesis based on the sum of observations. Ann. Math. Stat. 23, 493-507 (1952).
    • (1952) Ann. Math. Stat. , vol.23 , pp. 493-507
    • Chernoff, H.1
  • 38
    • 0041415963 scopus 로고    scopus 로고
    • Quantum key distribution with high loss: Toward global secure communication
    • Hwang, W.-Y. Quantum key distribution with high loss: toward global secure communication. Phys. Rev. Lett. 91, 057901 (2003).
    • (2003) Phys. Rev. Lett. , vol.91 , pp. 057901
    • Hwang, W.-Y.1
  • 39
    • 27744479495 scopus 로고    scopus 로고
    • Decoy state quantum key distribution
    • Lo, H.-K., Ma, X. & Chen, K. Decoy state quantum key distribution. Phys. Rev. Lett. 94, 230504 (2005).
    • (2005) Phys. Rev. Lett. , vol.94 , pp. 230504
    • Lo, H.-K.1    Ma, X.2    Chen, K.3
  • 40
    • 27744568650 scopus 로고    scopus 로고
    • Beating the photon-number-splitting attack in practical quantum cryptography
    • Wang, X.-B. Beating the photon-number-splitting attack in practical quantum cryptography. Phys. Rev. Lett. 94, 230503 (2005).
    • (2005) Phys. Rev. Lett. , vol.94 , pp. 230503
    • Wang, X.-B.1
  • 42
    • 84928045174 scopus 로고    scopus 로고
    • Quantum cryptographic network based on quantum memories
    • Biham, E., Huttner, B. & Mor, T. Quantum cryptographic network based on quantum memories. Phys. Rev. A 54, 2651-2658 (1996).
    • (1996) Phys. Rev. A , vol.54 , pp. 2651-2658
    • Biham, E.1    Huttner, B.2    Mor, T.3
  • 43
    • 0141922765 scopus 로고    scopus 로고
    • Security of practical time-reversed EPR quantum key distribution
    • Inamori, H. Security of practical time-reversed EPR quantum key distribution. Algorithmica 34, 340-365 (2002).
    • (2002) Algorithmica , vol.34 , pp. 340-365
    • Inamori, H.1
  • 44
    • 0001619342 scopus 로고    scopus 로고
    • Estimates for practical quantum cryptography
    • Lütkenhaus, N. Estimates for practical quantum cryptography. Phys. Rev. A 59, 3301-3319 (1999).
    • (1999) Phys. Rev. A , vol.59 , pp. 3301-3319
    • Lütkenhaus, N.1
  • 45
    • 84972574511 scopus 로고
    • Weighted sums of certain dependent random variables
    • Azuma, K. Weighted sums of certain dependent random variables. Tôhoku Math. J. 19, 357-367 (1967).
    • (1967) Tôhoku Math. J. , vol.19 , pp. 357-367
    • Azuma, K.1
  • 47
    • 34547480312 scopus 로고    scopus 로고
    • Entanglement-based quantum communication over 144 km
    • Ursin, R. et al. Entanglement-based quantum communication over 144 km. Nat. Phys. 3, 481-486 (2007).
    • (2007) Nat. Phys. , vol.3 , pp. 481-486
    • Ursin, R.1
  • 48
    • 84888335947 scopus 로고    scopus 로고
    • Practical aspects of measurement-device-independent quantum key distribution
    • Xu, F. et al. Practical aspects of measurement-device-independent quantum key distribution. New J. Phys. 15, 113007 (2013).
    • (2013) New J. Phys. , vol.15 , pp. 113007
    • Xu, F.1
  • 49
    • 72449202040 scopus 로고    scopus 로고
    • Single-photon detectors for optical quantum information applications
    • Hadfield, R. H. Single-photon detectors for optical quantum information applications. Nat. Photon. 3, 696-705 (2009).
    • (2009) Nat. Photon. , vol.3 , pp. 696-705
    • Hadfield, R.H.1
  • 50
    • 84874595936 scopus 로고    scopus 로고
    • Detecting single infrared photons with 93% system efficiency
    • Marsili, F. et al. Detecting single infrared photons with 93% system efficiency. Nat. Photon. 7, 210-214 (2013).
    • (2013) Nat. Photon. , vol.7 , pp. 210-214
    • Marsili, F.1
  • 51
    • 0001899764 scopus 로고
    • Probability inequalities for the sum in sampling without replacement
    • Serfling, R. J. Probability inequalities for the sum in sampling without replacement. Ann. Statist. 2, 39-48 (1974).
    • (1974) Ann. Statist. , vol.2 , pp. 39-48
    • Serfling, R.J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.