Universally-composable finite-key analysis for efficient four-intensity decoy-state quantum key distribution

Haodong Jiang,Ming Gao,Bao Yan,Weilong Wang,Zhi Ma
DOI: https://doi.org/10.1140/epjd/e2016-60655-2
2016-03-15
Abstract:We propose an efficient four-intensity decoy-state BB84 protocol and derive concise security bounds for this protocol with the universally composable finite-key analysis method. Comparing with the efficient three-intensity protocol, we find that our efficient four-intensity protocol can increase the secret key rate by at least $30\%$. Particularly, this increasing rate of secret key rate will be raised as the transmission distance increases. At a large transmission distance, our efficient four-intensity protocol can improve the performance of quantum key distribution profoundly.
Quantum Physics
What problem does this paper attempt to address?
### Problems the paper attempts to solve The paper aims to propose an efficient four - intensity decoy - state quantum key distribution (QKD) protocol and derive the security bound of this protocol through the universally composable finite - key analysis method. Compared with the existing efficient three - intensity protocols, this four - intensity protocol shows significant advantages in improving the key rate, especially in long - distance transmission. ### Main contributions 1. **Protocol design**: Propose an efficient four - intensity decoy - state BB84 protocol based on biased - basis selection. 2. **Security bound**: Use the universally composable finite - key analysis method to derive a concise security bound. 3. **Performance improvement**: Through numerical simulation, verify that this protocol can significantly improve the key rate compared with the three - intensity protocol at different transmission distances, especially in long - distance transmission, with an improvement rate of up to 60%. ### Key technical points - **Biased - basis selection**: Use three different intensities for key generation on the Z - basis and two different intensities for testing on the X - basis. - **Independent intensity setting**: Except for the lowest intensity, the selection of other intensities and bases is independent, which helps to reduce statistical fluctuations. - **Finite - key analysis**: Consider the statistical fluctuations caused by the finite - key length to ensure the security of the protocol in practical applications. ### Numerical simulation results - **Key - rate improvement**: When the transmission distance is 100 kilometers, the key rate of the four - intensity protocol is 60% higher than that of the three - intensity protocol. - **Long - distance advantage**: As the transmission distance increases, the key - rate improvement rate of the four - intensity protocol gradually increases. ### Conclusion The efficient four - intensity decoy - state QKD protocol proposed in this paper shows significant advantages in improving the key rate, especially in long - distance transmission. The effectiveness and superiority of this protocol are verified through numerical simulation.