• Aucun résultat trouvé

Protocol description

3. Decoy-state QKD 23

3.2. Protocol description

pµ3

!

. (3.9)

In addition, we denote by λX,1 the single-photon error rate, i.e., λX,1 := v˜X,1

˜

sX,1. (3.10)

As mentioned earlier, Eqns. (3.6), (3.7), (3.9) and (3.10) also apply to the Z basis; just change the subscript X toZ.

3.2. Protocol description

Similar to the previous chapter, we consider a biased basis choice BB84 pro-tocol, however, instead of using a single-photon source, Alice uses a phase-randomized laser source to generate quantum systems. Additionally, the in-tensity of each laser pulse is randomly set to one of the three intensities, K:={µ1, µ2, µ3}, whereµ1> µ23 and µ2 > µ3 ≥0.

The protocol is characterized by the following parameters: N, the number of laser pulses sent by Alice, nX,k, the number of detections given that Alice chooses Xbasis and intensity k and Bob chooses X basis, nZ,k, the number of detections given that Alice chooses Z basis and intensityk and Bob choose Z basis,pk, the probability of choosing intensityk,φtol, the tolerated error rate, SyndEC, the size of the error correcting information, cor, the correctness,pe, the error in the estimation, and, `, the secret key length. The protocol runs as follows.

Preparation: The first three steps of the protocol are repeated fori= 1,2, . . . , N until the conditions in the sifting step are fulfilled. Alice chooses a bit value uniformly at random and records the value in yi. Then, she selects a basis choiceai ∈ {X,Z} with probabilities qx and 1−qx, respectively, whereqx := (1+p

nZ/nX)1, and an intensity choiceki∈ Kwith proba-bilitiespµ1,pµ2 andpµ3 = 1−pµ1−pµ2, respectively. Finally, she prepares a weak laser pulse based on the chosen values and sends it to Bob via the quantum channel.

Measurement: Bob chooses a basis bi ∈ {X,Z} with probabilities qx and 1−qx, respectively. Then, he performs a measurement in basis bi and

3.3. Bounds on secret key length 29

records the outcome inyi0. In practice, the measurement device is usually implemented with two single-photon detectors. In this case, there are four possible outcomes{0,1,∅,⊥}, where0and1are the bit values, and

∅ and ⊥ are the no detection and double detection events, respectively.

For the first three outcomes, Bob assigns what he observes toy0i, and for the last outcome⊥, he assigns a random bit value to yi0.

Sifting: Alice and Bob announce their basis and intensity choices over an authenticated public channel and identify the following sets: Xk := {i: ai=bi =X∧ki =k∧yi0 6=∅}andZk :={i:ai =bi=Z∧ki=k∧yi0 6=∅}

for all k ∈ K. Then, they check for |Xk| ≥ nX,k and |Zk| ≥ nZ,k for all values of k.

Parameter Estimation: First, a raw key pair, X and X, is generated byˆ choosing a random sample of size nX = P

k∈KnX,k of X = ∪k∈KXk, where nX is the post-processing block size. Second, they announce the setsZk and compute the corresponding number of bit errors,cZ,k. Third, they calculate the number of vacuum events s˜X,0 and the number of single-photon eventss˜X,1 in the raw key pair. Finally, they calculate the error rate,λZ,1, of the single-photon events in the setsZk, and check that it satisfies λZ,1+t pe,˜sX,1,˜sZ,1, λZ,1

≤ Qtol. If it does, they proceed to the classical-post-processing step, otherwise, they abort the protocol.

Classical-post-processing: First, Alice and Bob perform an error correction step that reveals at most SyndEC-bits of information. In this step, we assume that they try to correct for an error rate that is predetermined.

Next, to ensure that they share a pair of identical keys, they perform an error-verification step using two-universal hash functions that publishes dlog21/core-bits of information. Finally, conditioned on passing this last step, they perform privacy amplification on their keys to extract a secret key pair,S and S, of sizeˆ `.

3.3. Bounds on secret key length

The security analysis of the protocol follows roughly along the lines of the one in the previous chapter. This is the case for the analysis of the correctness, since both protocols use the same error verification procedure, i.e., by using a family of two-universal hash functions to ensure that the raw keys are identical,

except with some (negligible) probability, cor. For this reason, we refer the correctness of the protocol to Theorem 1. The secrecy of the protocol is given below.

Theorem 3. For protocol parameters, nX,k, nZ,k, pk, Qtol, SyndEC, cor, and

`, the secret key is sec-secret if

` ≤ max

pe

$

˜

sX,0 + ˜sX,1 − s˜X,1h(Qtol) − SyndEC − log2 32 β8cor

%

, (3.11) where the maximization is taken over pe, β >0 such that 4pe+ 18β ≤sec. Proof. Let us denote byE+ the information that Eve gathers on X up to the error verification step. Then, according to Lemma4, the protocol is ∆-secret if

dsec(S|E+Y)≤2

2 −β

+ 232

2`Hmin/2β(X|E+)14

= ∆, (3.12)

where Y is the seed used to randomly choose a hash function in the privacy amplification step. To see why the proposed secret key length, Eq. (3.11), gives a sec-secret key, we first need to show that the smooth min-entropy in the above expression is lower bounded by

Hmin/2β X|E+

≥s˜X,0+ ˜sX,1−˜sX,1h(Qtol)−SyndEC−log2 8

α22α23cor, (3.13) for some α2, α3 ≥0.

To start with, we use a chain rule [17, Theorem 3.2.12] for smooth min-entropies to get

Hmin/2β X|E+

≥Hmin/2β(X|E)−SyndEC −log2 2 cor.

We note that X may contain contributions due to vacuum and multi-photon states. More specifically, X may be a concatenation of three different types of bit strings, XvXsXm, which correspond to Alice sending vacuum, single-photon and multi-single-photon states, respectively. Therefore, to analyze the secrecy ofX, we would need to decompose the smooth min-entropy ofX in such a way that it is lower bounded by the smooth min-entropy of Xs. This is achieved by using a recently formulated chain rule [60] for smooth min-entropies, i.e., for 1>0 and 2, 3 ≥0,

Hmin1+22+3(AB|C)≥Hmin2 (A|BC) +Hmin3 (B|C)−2 log2 1 1 −1.

3.3. Bounds on secret key length 31

In particular, we apply the above chain rule to Hmin/2β(XvXsXm|E) to get Hmin/2β(XvXsXm|E)≥Hminα1 (Xs|XvXmE)

+Hminα3+2α45(XvXm|E)−2 log2 1 α2 −1, where/2−β = 2α12+ (α3+ 2α45)withα1, α3 ≥0and α2>0. Then, we use the same chain-rule again on the second term on the r.h.s. to get

Hminα3+2α45(XvXm|E)≥Hminα4 (Xm|XvE)

+Hminα5 (Xv|E)−2 log2 1 α3 −1

≥˜sX,0−2 log2 1 α3 −1,

for α4, α5 ≥ 0 and α3 > 0. To get the second inequality, we used Hminα4 (Xm| XvE) ≥ 0 and Hminα5 (Xv|E) ≥ Hmin(Xv|E) = Hmin(Xv) ≥ log22˜sX,0 =

˜

sX,0. The former is given by the fact that all multi-photon events are pessimisti-cally taken to be insecure, e.g., due to photon number dependent attacks. The latter is based on the assumption that vacuum contributions contain zero infor-mation about Alice’s raw key, and the key value is drawn uniformly at random.

Putting the above expressions together therefore gives Hmin/2β X|E+

≥s˜X,0+Hminα1 (Xs|XvXmE)−SyndEC −log2 8 α22α23cor

.

Next, we use Eq. (2.2) to place a lower bound onHminα1 (Xs|XvXmE). That is, Hminα1 (Xs|XvXmE) ≥ s˜X,1+ ˜sX,1h(λZ,1+t(α1,s˜X,1,s˜Z,1, λZ,1))

≥ s˜X,1+ ˜sX,1h(Qtol),

where we used Qtol ≥ λZ,1 +t(pe,s˜X,1,s˜Z,1, λZ,1) and pe = α1

1−pabort. Combining everything together therefore gives Eq. (3.13).

Finally, putting Eq. (3.13) into Eq. (3.12), and composing the errors due to the estimation of decoy-state method parameters, it is easy to verify that the proposed secret key length, Eq. (3.11), gives a total error (conditioned on passing all the tests) of

∆≤2(2α123) + 2β+ 101+ 22. Removing the conditioning thus gives

(1−pabort)∆ ≤4pe+ 2(α23+β) + 101+ 22,

which can be simplified by choosing 1 =223 =β, i.e., (1−pabort)∆≤4pe+ 18β ≤sec.

3.4. Simulation: evaluation with real-world

Documents relatifs