Quantum key distribution with passive decoy state selection
نویسندگان
چکیده
We propose a quantum key distribution scheme which closely matches the performance of a perfect single photon source. It nearly attains the physical upper bound in terms of key generation rate and maximally achievable distance. Our scheme relies on a practical setup based on a parametric downconversion source and present day, nonideal photon-number detection. Arbitrary experimental imperfections which lead to bit errors are included. We select decoy states by classical postprocessing. This allows one to improve the effective signal statistics and achievable distance.
منابع مشابه
Passive Decoy State Quantum Key Distribution
The use of decoy states enhances the performance of practical quantum key distribution systems significantly by monitoring the quantum channel in a more detailed way. While active modulation of the intensity of the pulses is an effective way of preparing decoy states in principle, in practice passive preparation might be desirable in some scenarios. Known passive methods involve parametric down...
متن کاملNon-Poissonian statistics from Poissonian light sources with application to passive decoy state quantum key distribution.
We propose a method to prepare different non-Poissonian signal pulses from sources of Poissonian photon number distribution, using only linear optical elements and threshold photon detectors. This method allows a simple passive preparation of decoy states for quantum key distribution. We show that the resulting key rates are comparable with the performance of active choices of intensities of Po...
متن کاملRound-robin differential-phase-shift quantum key distribution with a passive decoy state method
Recently, a new type of protocol named Round-robin differential-phase-shift quantum key distribution (RRDPS QKD) was proposed, where the security can be guaranteed without monitoring conventional signal disturbances. The active decoy state method can be used in this protocol to overcome the imperfections of the source. But, it may lead to side channel attacks and break the security of QKD syste...
متن کاملHeralded single photon sources for QKD applications
Single photon sources (SPS) are a fundamental building block for optical implementations of quantum information protocols. Among SPSs, multiple crystal heralded single photon sources seem to give the best compromise between high pair production rate and low multiple photon events. In this work, we study their performance in a practical quantum key distribution experiment, by evaluating the achi...
متن کاملPassive scheme analysis for resolving an untrusted source problem in quantum key distribution
As a practical method, the passive scheme has been used to analyze the security of an untrusted source in quantum key distribution. In the passive scheme, one can utilize average-photon-number (APN) monitor, photon-number-distribution (PND) monitor and photon-number analyzer (PNA) to achieve the unconditional security with using BB84 protocol or decoy-state protocol. In this paper, the ClopperP...
متن کامل