Practical issues in decoy-state quantum key distribution based on the central limit theorem
نویسندگان
چکیده
A.S. Trushechkin, 2, 3 E.O. Kiktenko, 4 and A.K. Fedorov 5, 6 Steklov Mathematical Institute of Russian Academy of Sciences, Moscow 119991, Russia National Research Nuclear University MEPhI, Moscow 115409, Russia Department of Mathematics and Russian Quantum Center, National University of Science and Technology MISiS, Moscow 119049, Russia Bauman Moscow State Technical University, Moscow 105005, Russia Russian Quantum Center, Skolkovo, Moscow 143025, Russia LPTMS, CNRS, Univ. Paris-Sud, Université Paris-Saclay, Orsay 91405, France (Dated: March 1, 2017)
منابع مشابه
Practical decoy state for quantum key distribution
Decoy states have recently been proposed as a useful method for substantially improving the performance of quantum key distribution QKD . Here, we present a general theory of the decoy state protocol based on only two decoy states and one signal state. We perform optimization on the choice of intensities of the two decoy states and the signal state. Our result shows that a decoy state protocol ...
متن کامل200km Decoy-state quantum key distribution with photon polarization
We demonstrate the decoy-state quantum key distribution over 200 km with photon polarization through optical fiber, by using superconducting single photon detector with a repetition rate of 320 Mega Hz and a dark count rate of lower than 1 Hz. Since we have used the polarization coding, the synchronization pulses can be run in a low frequency. The final key rate is 14.1 Hz. The experiment lasts...
متن کاملQuantum key distribution with passive decoy state selection
We propose a quantum key distribution scheme which closely matches the performance of a perfect single photon source. It nearly attains the physical upper bound in terms of key generation rate and maximally achievable distance. Our scheme relies on a practical setup based on a parametric downconversion source and present day, nonideal photon-number detection. Arbitrary experimental imperfection...
متن کاملSecurity analysis of quantum key distribution on passive optical networks.
Needs for providing security to end users have brought installation of quantum key distribution (QKD) in one-to-many access networks such as passive optical networks. In the networks, a presence of optical power splitters makes issues for secure key rate more important. However, researches for QKD in access networks have mainly focused on implementation issues rather than protocol development f...
متن کاملUnconditional security at a low cost
By simulating four quantum key distribution (QKD) experiments and analyzing one decoy-state QKD experiment, we compare two data post-processing schemes based on security against individual attack by Lütkenhaus, and unconditional security analysis by Gottesman-Lo-Lütkenhaus-Preskill. Our results show that these two schemes yield close performances. Since the Holy Grail of QKD is its unconditiona...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1702.08531 شماره
صفحات -
تاریخ انتشار 2017