Passive Decoy State Quantum Key Distribution

نویسندگان

  • Marcos Curty
  • Tobias Moroder
  • Xiongfeng Ma
  • Norbert Lütkenhaus
چکیده

The use of decoy states enhances the performance of practical quantum key distribution systems significantly by monitoring the quantum channel in a more detailed way. While active modulation of the intensity of the pulses is an effective way of preparing decoy states in principle, in practice passive preparation might be desirable in some scenarios. Known passive methods involve parametric down-conversion. In this paper we show how phase randomized coherent states can be used for the same purpose. Our method involves only linear optics together with a simple threshold photon detector. The performace is comparable to the active decoy methods.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Quantum key distribution with passive decoy state selection

We propose a quantum key distribution scheme which closely matches the performance of a perfect single photon source. It nearly attains the physical upper bound in terms of key generation rate and maximally achievable distance. Our scheme relies on a practical setup based on a parametric downconversion source and present day, nonideal photon-number detection. Arbitrary experimental imperfection...

متن کامل

Non-Poissonian statistics from Poissonian light sources with application to passive decoy state quantum key distribution.

We propose a method to prepare different non-Poissonian signal pulses from sources of Poissonian photon number distribution, using only linear optical elements and threshold photon detectors. This method allows a simple passive preparation of decoy states for quantum key distribution. We show that the resulting key rates are comparable with the performance of active choices of intensities of Po...

متن کامل

Round-robin differential-phase-shift quantum key distribution with a passive decoy state method

Recently, a new type of protocol named Round-robin differential-phase-shift quantum key distribution (RRDPS QKD) was proposed, where the security can be guaranteed without monitoring conventional signal disturbances. The active decoy state method can be used in this protocol to overcome the imperfections of the source. But, it may lead to side channel attacks and break the security of QKD syste...

متن کامل

Passive scheme analysis for resolving an untrusted source problem in quantum key distribution

As a practical method, the passive scheme has been used to analyze the security of an untrusted source in quantum key distribution. In the passive scheme, one can utilize average-photon-number (APN) monitor, photon-number-distribution (PND) monitor and photon-number analyzer (PNA) to achieve the unconditional security with using BB84 protocol or decoy-state protocol. In this paper, the ClopperP...

متن کامل

Bright integrated photon-pair source for practical passive decoy-state quantum key distribution

S. Krapick,1,* M. S. Stefszky,1 M. Jachura,1,2 B. Brecht,1 M. Avenhaus,1,3 and C. Silberhorn1,3 1Department of Physics, University of Paderborn, Warburger Str. 100, 33098 Paderborn, Germany 2Faculty of Physics, University of Warsaw, Hoża 69, 00-681 Warsaw, Poland 3Max-Planck-Institute for the Science of Light, Günther-Scharowsky-Str. 1, 91058 Erlangen, Germany (Received 25 September 2013; publi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009