Recognition: unknown
Finite-size quantum key distribution rates from R\'enyi entropies using conic optimization
read the original abstract
Finite-size general security proofs for quantum key distribution based on R\'enyi entropies have recently been introduced. These approaches are more flexible and provide tighter bounds on the secret key rate than traditional formulations based on the von Neumann entropy. However, deploying them requires minimizing the conditional R\'enyi entropy, a difficult optimization problem that has hitherto been tackled using ad-hoc techniques based on the Frank-Wolfe algorithm, which are unstable and can only handle particular cases. In this work, we introduce a method based on non-symmetric conic optimization for solving this problem. Our technique is fast, reliable, and completely general. We illustrate its performance on several protocols, whose results represent an improvement over the state of the art.
This paper has not been read by Pith yet.
Forward citations
Cited by 2 Pith papers
-
Rigorous Security Proofs for Practical Quantum Key Distribution
Rigorous security proofs for variable-length QKD, phase-error bounding with imperfect detectors, marginal-constrained entropy accumulation, and authentication reductions place practical QKD on firmer mathematical ground.
-
Numerical security analysis for practical quantum key distribution
A numerical framework proves finite-key security for practical decoy-state QKD systems with transmitter and receiver imperfections including non-IID signals.
discussion (0)
Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.