Physical Review Research (Apr 2024)

Security proof for variable-length quantum key distribution

  • Devashish Tupkary,
  • Ernest Y.-Z. Tan,
  • Norbert Lütkenhaus

DOI
https://doi.org/10.1103/PhysRevResearch.6.023002
Journal volume & issue
Vol. 6, no. 2
p. 023002

Abstract

Read online Read online

We present a security proof for variable-length QKD in the Renner framework against IID collective attacks. Our proof can be lifted to coherent attacks using the postselection technique. Our first main result is a theorem to convert a sequence of security proofs for fixed-length protocols satisfying certain conditions to a security proof for a variable-length protocol. This conversion requires no new calculations, does not require any changes to the final key lengths or the amount of error-correction information, and at most doubles the security parameter. Our second main result is the description and security proof of a more general class of variable-length QKD protocols, which does not require characterizing the honest behavior of the channel connecting the users before the execution of the QKD protocol. Instead, these protocols adaptively determine the length of the final key, and the amount of information to be used for error correction, based upon the observations made during the protocol. We apply these results to the qubit BB84 protocol, and show that variable-length implementations lead to higher expected key rates than the fixed-length implementations.