Practical decoy state for quantum key distribution

نویسندگان

  • Xiongfeng Ma
  • Bing Qi
  • Yi Zhao
چکیده

Decoy states have recently been proposed as a useful method for substantially improving the performance of quantum key distribution QKD . Here, we present a general theory of the decoy state protocol based on only two decoy states and one signal state. We perform optimization on the choice of intensities of the two decoy states and the signal state. Our result shows that a decoy state protocol with only two types of decoy states— the vacuum and a weak decoy state—asymptotically approaches the theoretical limit of the most general type of decoy state protocol with an infinite number of decoy states . We also present a one-decoy-state protocol. Moreover, we provide estimations on the effects of statistical fluctuations and suggest that, even for longdistance larger than 100 km QKD, our two-decoy-state protocol can be implemented with only a few hours of experimental data. In conclusion, decoy state quantum key distribution is highly practical.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

200km Decoy-state quantum key distribution with photon polarization

We demonstrate the decoy-state quantum key distribution over 200 km with photon polarization through optical fiber, by using superconducting single photon detector with a repetition rate of 320 Mega Hz and a dark count rate of lower than 1 Hz. Since we have used the polarization coding, the synchronization pulses can be run in a low frequency. The final key rate is 14.1 Hz. The experiment lasts...

متن کامل

Passive Decoy State Quantum Key Distribution

The use of decoy states enhances the performance of practical quantum key distribution systems significantly by monitoring the quantum channel in a more detailed way. While active modulation of the intensity of the pulses is an effective way of preparing decoy states in principle, in practice passive preparation might be desirable in some scenarios. Known passive methods involve parametric down...

متن کامل

Practical decoy state method in quantum key distribution with heralded single photon source

Qin Wang, Xiang-Bin Wang, and Guang-Can Guo Key Laboratory of Quantum Information, Department of Physics, University of Science and Technology of China, Hefei 230026, People’s Republic of China and Department of Physics, Tsinghua University, Beijing 100084, China Abstract We propose a practical decoy state method with heralded single photon source for quantum key distribution (QKD). In the prot...

متن کامل

Quantum key distribution with passive decoy state selection

We propose a quantum key distribution scheme which closely matches the performance of a perfect single photon source. It nearly attains the physical upper bound in terms of key generation rate and maximally achievable distance. Our scheme relies on a practical setup based on a parametric downconversion source and present day, nonideal photon-number detection. Arbitrary experimental imperfection...

متن کامل

Security of Quantum Key Distribution with Realistic Devices

We simulate quantum key distribution (QKD) experimental setups and give out some improvement for QKD procedures. A new data post-processing protocol is introduced, mainly including error correction and privacy amplification. This protocol combines the ideas of GLLP and the decoy states, which essentially only requires to turn up and down the source power. We propose a practical way to perform t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005