Thermal state quantum key distribution
نویسندگان
چکیده
We analyse a central broadcast continuous variable quantum key distribution protocol in which beam produced by thermal source is used to create secret between two parties, Alice and Bob. A splitter divides the initial into pair of output beams, are sent Bob, with Eve intercepting Bob's beam. investigate detail, calculating mutual informations through analytic methods comparing results outputs Monte Carlo simulation protocol. In lossless system, we find that lower bound on rate remains positive under attack, provided Bob receives nonzero proportion initially him. This suggests state could be experimentally produce secure keys.
منابع مشابه
Decoy state quantum key distribution.
There has been much interest in quantum key distribution. Experimentally, quantum key distribution over 150 km of commercial Telecom fibers has been successfully performed. The crucial issue in quantum key distribution is its security. Unfortunately, all recent experiments are, in principle, insecure due to real-life imperfections. Here, we propose a method that can for the first time make most...
متن کاملDecoy State Quantum Key Distribution
Experimental weak + vacuum protocol has been demonstrated using commercial QKD system based on a standard bi-directional ‘Plug & Play’ set-up. By making simple modifications to a commercial quantum key distribution system, decoy state QKD allows us to achieve much better performance than QKD system without decoy state in terms of key generation rate and distance. We demonstrate an unconditional...
متن کاملPractical decoy state for quantum key distribution
Decoy states have recently been proposed as a useful method for substantially improving the performance of quantum key distribution QKD . Here, we present a general theory of the decoy state protocol based on only two decoy states and one signal state. We perform optimization on the choice of intensities of the two decoy states and the signal state. Our result shows that a decoy state protocol ...
متن کاملPassive Decoy State Quantum Key Distribution
The use of decoy states enhances the performance of practical quantum key distribution systems significantly by monitoring the quantum channel in a more detailed way. While active modulation of the intensity of the pulses is an effective way of preparing decoy states in principle, in practice passive preparation might be desirable in some scenarios. Known passive methods involve parametric down...
متن کاملPhoton-number-solving Decoy State Quantum Key Distribution
Yong-gang Tan and Qing-yu Cai1∗ State Key Laboratory of Magnetic Resonance and Atomic and Molecular Physics, Wuhan Institute of Physics and Mathematics, the Chinese Academy of Sciences, Wuhan ,430071, China and Graduation University of the Chinese Academy of Sciences, Beijing 10081, China Abstract Practical photon sources are weak coherent sources so that multiphoton pulses are inevitable. In o...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Physics B
سال: 2021
ISSN: ['0953-4075', '1361-6455']
DOI: https://doi.org/10.1088/1361-6455/ac2a6e