Parameter optimization in biased decoy-state quantum key distribution with both source errors and statistical fluctuations
نویسندگان
چکیده
We show how to calculate the fraction of single-photon counts of the 3-intensity decoy-state quantum cryptography faithfully with both statistical fluctuations and source errors. Our results rely only on the bound values of a few parameters of the states of pulses. 6 Author to whom any correspondence should be addressed. New Journal of Physics 11 (2009) 075006 1367-2630/09/075006+17$30.00 © IOP Publishing Ltd and Deutsche Physikalische Gesellschaft
منابع مشابه
Decoy-state quantum key distribution with biased basis choice
We propose a quantum key distribution scheme that combines a biased basis choice with the decoy-state method. In this scheme, Alice sends all signal states in the Z basis and decoy states in the X and Z basis with certain probabilities, and Bob measures received pulses with optimal basis choice. This scheme simplifies the system and reduces the random number consumption. From the simulation res...
متن کاملPractical decoy state for quantum key distribution
Decoy states have recently been proposed as a useful method for substantially improving the performance of quantum key distribution QKD . Here, we present a general theory of the decoy state protocol based on only two decoy states and one signal state. We perform optimization on the choice of intensities of the two decoy states and the signal state. Our result shows that a decoy state protocol ...
متن کامل200km Decoy-state quantum key distribution with photon polarization
We demonstrate the decoy-state quantum key distribution over 200 km with photon polarization through optical fiber, by using superconducting single photon detector with a repetition rate of 320 Mega Hz and a dark count rate of lower than 1 Hz. Since we have used the polarization coding, the synchronization pulses can be run in a low frequency. The final key rate is 14.1 Hz. The experiment lasts...
متن کاملQuantum key distribution with passive decoy state selection
We propose a quantum key distribution scheme which closely matches the performance of a perfect single photon source. It nearly attains the physical upper bound in terms of key generation rate and maximally achievable distance. Our scheme relies on a practical setup based on a parametric downconversion source and present day, nonideal photon-number detection. Arbitrary experimental imperfection...
متن کاملPassive scheme analysis for resolving an untrusted source problem in quantum key distribution
As a practical method, the passive scheme has been used to analyze the security of an untrusted source in quantum key distribution. In the passive scheme, one can utilize average-photon-number (APN) monitor, photon-number-distribution (PND) monitor and photon-number analyzer (PNA) to achieve the unconditional security with using BB84 protocol or decoy-state protocol. In this paper, the ClopperP...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Quantum Information Processing
دوره 16 شماره
صفحات -
تاریخ انتشار 2017