Passive Decoy State Quantum Key Distribution
نویسندگان
چکیده
The use of decoy states enhances the performance of practical quantum key distribution systems significantly by monitoring the quantum channel in a more detailed way. While active modulation of the intensity of the pulses is an effective way of preparing decoy states in principle, in practice passive preparation might be desirable in some scenarios. Known passive methods involve parametric down-conversion. In this paper we show how phase randomized coherent states can be used for the same purpose. Our method involves only linear optics together with a simple threshold photon detector. The performace is comparable to the active decoy methods.
منابع مشابه
Quantum key distribution with passive decoy state selection
We propose a quantum key distribution scheme which closely matches the performance of a perfect single photon source. It nearly attains the physical upper bound in terms of key generation rate and maximally achievable distance. Our scheme relies on a practical setup based on a parametric downconversion source and present day, nonideal photon-number detection. Arbitrary experimental imperfection...
متن کاملNon-Poissonian statistics from Poissonian light sources with application to passive decoy state quantum key distribution.
We propose a method to prepare different non-Poissonian signal pulses from sources of Poissonian photon number distribution, using only linear optical elements and threshold photon detectors. This method allows a simple passive preparation of decoy states for quantum key distribution. We show that the resulting key rates are comparable with the performance of active choices of intensities of Po...
متن کاملRound-robin differential-phase-shift quantum key distribution with a passive decoy state method
Recently, a new type of protocol named Round-robin differential-phase-shift quantum key distribution (RRDPS QKD) was proposed, where the security can be guaranteed without monitoring conventional signal disturbances. The active decoy state method can be used in this protocol to overcome the imperfections of the source. But, it may lead to side channel attacks and break the security of QKD syste...
متن کاملPassive scheme analysis for resolving an untrusted source problem in quantum key distribution
As a practical method, the passive scheme has been used to analyze the security of an untrusted source in quantum key distribution. In the passive scheme, one can utilize average-photon-number (APN) monitor, photon-number-distribution (PND) monitor and photon-number analyzer (PNA) to achieve the unconditional security with using BB84 protocol or decoy-state protocol. In this paper, the ClopperP...
متن کاملBright integrated photon-pair source for practical passive decoy-state quantum key distribution
S. Krapick,1,* M. S. Stefszky,1 M. Jachura,1,2 B. Brecht,1 M. Avenhaus,1,3 and C. Silberhorn1,3 1Department of Physics, University of Paderborn, Warburger Str. 100, 33098 Paderborn, Germany 2Faculty of Physics, University of Warsaw, Hoża 69, 00-681 Warsaw, Poland 3Max-Planck-Institute for the Science of Light, Günther-Scharowsky-Str. 1, 91058 Erlangen, Germany (Received 25 September 2013; publi...
متن کامل