The security of quantum key distribution has traditionally been analyzed in either the asymptotic or non-asymptotic regimes. In this paper, we provide a bridge between these two regimes, by determining second-order coding rates for key distillation in quantum key distribution under collective attacks. Our main result is a formula that characterizes the backoff from the known asymptotic formula for key distillation -- our formula incorporates the reliability and security of the protocol, as well as the mutual information variances to the legitimate receiver and the eavesdropper. In order to determine secure key rates against collective attacks, one should perform a joint optimization of the Holevo information and the Holevo information variance to the eavesdropper. We show how to do so by analyzing several examples, including the six-state, BB84, and continuous-variable quantum key distribution protocols (the last involving Gaussian modulation of coherent states along with heterodyne detection). The technical contributions of this paper include one-shot and second-order analyses of private communication over a compound quantum wiretap channel with fixed marginal and key distillation over a compound quantum wiretap source with fixed marginal. We also establish the second-order asymptotics of the smooth max-relative entropy of quantum states acting on a separable Hilbert space, and we derive a formula for the Holevo information variance of a Gaussian ensemble of Gaussian states.
翻译:量子键分布的安全性历来在无线或非线性系统中分析过。 在本文中,我们通过确定集体袭击下量子键分布的关键蒸馏的第二顺序编码率,在这两种制度之间提供了一个桥梁。我们的主要结果是一个公式,它从已知的关键蒸馏的“线性”公式后退的特点 -- -- 我们的公式包含协议的可靠性和安全性,以及合法接收者和窃听器之间的相互信息差异。为了确定针对集体袭击的安全关键率,我们应联合优化Holevo信息和Holevo信息对evesdrop的偏差。我们通过分析几个例子,包括六州、BB84和连续可变量性量性键分配协议(最后一个公式包括协议的可靠性和安全性调整,以及对合法接收者和窃听者之间的相互信息差异性。本文的技术贡献包括一张照片和二阶级私人通信对一个复合量子线性窃听频道的分析,与固定边际和关键平流性平流性平流性平流性平流性平流性平流性平流性平流性平流性平流性平流性平流性平流性平流性平流性平流性平流性平压性平压性平压性平质质质质质质质质质质质质质质质质质调质质质质质质质质质质调调调调质质质质质质质质质调调调调调调调调调调调调调调调质质质质质质质质质质质质质质质质质质质质质质质质质质质质质质质质质质调制。