Thermal state quantum key distribution

نویسندگان

چکیده

We analyse a central broadcast continuous variable quantum key distribution protocol in which beam produced by thermal source is used to create secret between two parties, Alice and Bob. A splitter divides the initial into pair of output beams, are sent Bob, with Eve intercepting Bob's beam. investigate detail, calculating mutual informations through analytic methods comparing results outputs Monte Carlo simulation protocol. In lossless system, we find that lower bound on rate remains positive under attack, provided Bob receives nonzero proportion initially him. This suggests state could be experimentally produce secure keys.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Decoy state quantum key distribution.

There has been much interest in quantum key distribution. Experimentally, quantum key distribution over 150 km of commercial Telecom fibers has been successfully performed. The crucial issue in quantum key distribution is its security. Unfortunately, all recent experiments are, in principle, insecure due to real-life imperfections. Here, we propose a method that can for the first time make most...

متن کامل

Decoy State Quantum Key Distribution

Experimental weak + vacuum protocol has been demonstrated using commercial QKD system based on a standard bi-directional ‘Plug & Play’ set-up. By making simple modifications to a commercial quantum key distribution system, decoy state QKD allows us to achieve much better performance than QKD system without decoy state in terms of key generation rate and distance. We demonstrate an unconditional...

متن کامل

Practical decoy state for quantum key distribution

Decoy states have recently been proposed as a useful method for substantially improving the performance of quantum key distribution QKD . Here, we present a general theory of the decoy state protocol based on only two decoy states and one signal state. We perform optimization on the choice of intensities of the two decoy states and the signal state. Our result shows that a decoy state protocol ...

متن کامل

Passive Decoy State Quantum Key Distribution

The use of decoy states enhances the performance of practical quantum key distribution systems significantly by monitoring the quantum channel in a more detailed way. While active modulation of the intensity of the pulses is an effective way of preparing decoy states in principle, in practice passive preparation might be desirable in some scenarios. Known passive methods involve parametric down...

متن کامل

Photon-number-solving Decoy State Quantum Key Distribution

Yong-gang Tan and Qing-yu Cai1∗ State Key Laboratory of Magnetic Resonance and Atomic and Molecular Physics, Wuhan Institute of Physics and Mathematics, the Chinese Academy of Sciences, Wuhan ,430071, China and Graduation University of the Chinese Academy of Sciences, Beijing 10081, China Abstract Practical photon sources are weak coherent sources so that multiphoton pulses are inevitable. In o...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Physics B

سال: 2021

ISSN: ['0953-4075', '1361-6455']

DOI: https://doi.org/10.1088/1361-6455/ac2a6e