Skip to main content
Erschienen in: Quantum Information Processing 10/2017

01.10.2017

An improved proposal on the practical quantum key distribution with biased basis

verfasst von: Chen-Chen Mao, Jian Li, Jian-Rong Zhu, Chun-Mei Zhang, Qin Wang

Erschienen in: Quantum Information Processing | Ausgabe 10/2017

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this manuscript, we propose an improved scheme on the decoy-state quantum key distribution (QKD) under practical experimental conditions with biased basis. Compared with the standard decoy-state method with biased basis (prepare signal pulses in both X and Z basis with certain probabilities, and weak decoy pulses as well), the difference here is, we prepare signal pulses in both X and Z basis, but the weak decoy state in only X basis. In the follow-up, we adopt this scheme to conducting numerical simulations on the QKD with the mostly often used source, i.e., weak coherent source by taking statistical fluctuations into account. Furthermore, we carry out full parameter optimization on it. Numerical simulation results demonstrate that our new scheme can present a higher key generation rate and a longer transmission distance compared with standard three-intensity decoy-state method with biased basis. Moreover, it shows drastically improved performance by conducting full parameter optimization in our new scheme compared with partial optimization.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat Lo, H.-K., Chau, H.F.: Unconditional security of quantum key distribution over arbitrarily long distances. Science 283, 2050 (1999)ADSCrossRef Lo, H.-K., Chau, H.F.: Unconditional security of quantum key distribution over arbitrarily long distances. Science 283, 2050 (1999)ADSCrossRef
4.
Zurück zum Zitat Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing, pp. 175–179. IEEE, New York (1984) Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing, pp. 175–179. IEEE, New York (1984)
5.
Zurück zum Zitat Shor, P.W., Preskill, J.: Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85, 441 (2000)ADSCrossRef Shor, P.W., Preskill, J.: Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85, 441 (2000)ADSCrossRef
6.
Zurück zum Zitat Peev, M., Pacher, C., Alleaume, R., et al.: The SECOQC quantum key distribution network in Vienna. New J. Phys. 11, 075001 (2009)ADSCrossRef Peev, M., Pacher, C., Alleaume, R., et al.: The SECOQC quantum key distribution network in Vienna. New J. Phys. 11, 075001 (2009)ADSCrossRef
7.
Zurück zum Zitat Sasaki, M., Fujiwara, M., Ishizuka, H., et al.: Field test of quantum key distribution in the Tokyo QKD network. Opt. Express 19, 10387 (2011)ADSCrossRef Sasaki, M., Fujiwara, M., Ishizuka, H., et al.: Field test of quantum key distribution in the Tokyo QKD network. Opt. Express 19, 10387 (2011)ADSCrossRef
8.
Zurück zum Zitat Lo, H.-K., Chau, H.F., Ardehali, M.: Efficient quantum key distribution scheme and a proof of its unconditional security. J. Cryptol. 18, 133 (2005)MathSciNetCrossRefMATH Lo, H.-K., Chau, H.F., Ardehali, M.: Efficient quantum key distribution scheme and a proof of its unconditional security. J. Cryptol. 18, 133 (2005)MathSciNetCrossRefMATH
9.
Zurück zum Zitat Brassard, G., Ltkenhaus, N., Mor, T., Sanders, B.C.: Limitations on practical quantum cryptography. Phys. Rev. Lett. 85, 1330 (2000)ADSCrossRef Brassard, G., Ltkenhaus, N., Mor, T., Sanders, B.C.: Limitations on practical quantum cryptography. Phys. Rev. Lett. 85, 1330 (2000)ADSCrossRef
10.
Zurück zum Zitat Ltkenhaus, N., Jahma, M.: Quantum key distribution with realistic states: photon-number statistics in the photon-number splitting attack. New J. Phys. 4, 44.1 (2002) Ltkenhaus, N., Jahma, M.: Quantum key distribution with realistic states: photon-number statistics in the photon-number splitting attack. New J. Phys. 4, 44.1 (2002)
11.
Zurück zum Zitat Hwang, W.Y.: Quantum key distribution with high loss: toward global secure communication. Phys. Rev. Lett. 91, 057901 (2003)ADSCrossRef Hwang, W.Y.: Quantum key distribution with high loss: toward global secure communication. Phys. Rev. Lett. 91, 057901 (2003)ADSCrossRef
12.
Zurück zum Zitat Wang, X.-B.: Beating the photon-number-splitting attack in practical quantum crytography. Phys. Rev. Lett. 94, 230503 (2005)ADSCrossRef Wang, X.-B.: Beating the photon-number-splitting attack in practical quantum crytography. Phys. Rev. Lett. 94, 230503 (2005)ADSCrossRef
13.
Zurück zum Zitat Wang, Q., Wang, X.-B., Guo, G.-C.: Practical decoy-state method in quantum key distribution with a heralded single-photon source. Phys. Rev. A 75, 012312 (2007)ADSCrossRef Wang, Q., Wang, X.-B., Guo, G.-C.: Practical decoy-state method in quantum key distribution with a heralded single-photon source. Phys. Rev. A 75, 012312 (2007)ADSCrossRef
14.
Zurück zum Zitat Wang, Q., Chen, W., Xavier, G., et al.: Experimental decoy-state quantum key distribution with a sub-Poissionian heralded single-photon source. Phys. Rev. Lett. 100, 090501 (2008)ADSCrossRef Wang, Q., Chen, W., Xavier, G., et al.: Experimental decoy-state quantum key distribution with a sub-Poissionian heralded single-photon source. Phys. Rev. Lett. 100, 090501 (2008)ADSCrossRef
15.
Zurück zum Zitat Wang, Q., Wang, X.-B.: Improved practical decoy state method in quantum key distribution with parametric down-conversion source. Europhys. Lett. 79, 40001 (2007)ADSMathSciNetCrossRef Wang, Q., Wang, X.-B.: Improved practical decoy state method in quantum key distribution with parametric down-conversion source. Europhys. Lett. 79, 40001 (2007)ADSMathSciNetCrossRef
16.
Zurück zum Zitat Lo, H.-K., Ma, X.-F., Chen, K.: Decoy state quantum key distribution. Phys. Rev. Lett. 94, 230504 (2005)ADSCrossRef Lo, H.-K., Ma, X.-F., Chen, K.: Decoy state quantum key distribution. Phys. Rev. Lett. 94, 230504 (2005)ADSCrossRef
17.
Zurück zum Zitat Ma, X.-F., Qi, B., Zhao, Y., Lo, H.-K.: Practical decoy state for quantum key distribution. Phys. Rev. A 75, 012312 (2007)CrossRef Ma, X.-F., Qi, B., Zhao, Y., Lo, H.-K.: Practical decoy state for quantum key distribution. Phys. Rev. A 75, 012312 (2007)CrossRef
18.
Zurück zum Zitat Peng, C.-Z., Zhang, J., Yang, D., et al.: Experimental long-distance decoy-state quantum key distribution based on polarization encoding. Phys. Rev. Lett. 98, 010505 (2007)ADSCrossRef Peng, C.-Z., Zhang, J., Yang, D., et al.: Experimental long-distance decoy-state quantum key distribution based on polarization encoding. Phys. Rev. Lett. 98, 010505 (2007)ADSCrossRef
19.
Zurück zum Zitat Wei, Z.-C., Wang, W.-L., Zhang, Z., Guo, M., Ma, X.-F.: Decoy-state quantum key distribution with biased basis choice. Sci. Rep. 3, 2454 (2013)CrossRef Wei, Z.-C., Wang, W.-L., Zhang, Z., Guo, M., Ma, X.-F.: Decoy-state quantum key distribution with biased basis choice. Sci. Rep. 3, 2454 (2013)CrossRef
20.
Zurück zum Zitat Lucamarini, M., Patel, K., Dynes, J., et al.: Efficient decoy-state quantum key distribution with quantified security. Opt. Express 21, 24550 (2013)ADSCrossRef Lucamarini, M., Patel, K., Dynes, J., et al.: Efficient decoy-state quantum key distribution with quantified security. Opt. Express 21, 24550 (2013)ADSCrossRef
21.
Zurück zum Zitat Lim, C.C.W., Curty, M., Walenta, N., et al.: Concise security bounds for practical decoy-state quantum key distribution. Phys. Rev. A 89, 022307 (2014)ADSCrossRef Lim, C.C.W., Curty, M., Walenta, N., et al.: Concise security bounds for practical decoy-state quantum key distribution. Phys. Rev. A 89, 022307 (2014)ADSCrossRef
22.
Zurück zum Zitat Gottesman, D., Lo, H.-K., Ltkenhaus, N., Preskill, J.: Security of quantum key distribution with imperfect devices. Quantum Inf. Comput. 4, 325 (2004)MathSciNetMATH Gottesman, D., Lo, H.-K., Ltkenhaus, N., Preskill, J.: Security of quantum key distribution with imperfect devices. Quantum Inf. Comput. 4, 325 (2004)MathSciNetMATH
23.
Zurück zum Zitat Fung, C.-H.F., Ma, X.-F., Chau, H.F.: Practical issues in quantum-key-distribution postprocessing. Phys. Rev. A 81, 012318 (2010)ADSCrossRef Fung, C.-H.F., Ma, X.-F., Chau, H.F.: Practical issues in quantum-key-distribution postprocessing. Phys. Rev. A 81, 012318 (2010)ADSCrossRef
24.
Zurück zum Zitat Zhou, Y.-H., Yu, Z.-W., Wang, X.-B.: Tightened estimation can improve the key rate of measurement-device-indepengdent quantum key distribution by more than 100%. Phys. Rev. A 89, 052325 (2014)ADSCrossRef Zhou, Y.-H., Yu, Z.-W., Wang, X.-B.: Tightened estimation can improve the key rate of measurement-device-indepengdent quantum key distribution by more than 100%. Phys. Rev. A 89, 052325 (2014)ADSCrossRef
25.
Zurück zum Zitat Ma, X.-F., Fung, C.-H.F., Boileau, J.-C., Chau, H.F.: Universally composable and customizable post-processing for practical quantum key distribution. Comput. Secur. 30, 172 (2011)CrossRef Ma, X.-F., Fung, C.-H.F., Boileau, J.-C., Chau, H.F.: Universally composable and customizable post-processing for practical quantum key distribution. Comput. Secur. 30, 172 (2011)CrossRef
26.
Zurück zum Zitat Wang, X.-B., Yang, L., Peng, C.-Z., Pan, J.-W.: Decoy-state quantum key distribution with both source errors and statistical fluctuations. New J. Phys. 11, 075006 (2009)ADSCrossRef Wang, X.-B., Yang, L., Peng, C.-Z., Pan, J.-W.: Decoy-state quantum key distribution with both source errors and statistical fluctuations. New J. Phys. 11, 075006 (2009)ADSCrossRef
27.
Zurück zum Zitat Yu, Z.-W., Zhou, Y.-H., Wang, X.-B.: Statistical fluctuation analysis for measurement-device-independent quantum key distribution three-intensity decoy-state method. Phys. Rev. A 91, 032318 (2015)ADSCrossRef Yu, Z.-W., Zhou, Y.-H., Wang, X.-B.: Statistical fluctuation analysis for measurement-device-independent quantum key distribution three-intensity decoy-state method. Phys. Rev. A 91, 032318 (2015)ADSCrossRef
28.
Zurück zum Zitat Xu, F.-H., Xu, H., Lo, H.-K.: Protocol choice and parameter optimization in decoy-state measurement-device-independent quantum key distribution. Phys. Rev. A 89, 052333 (2014)ADSCrossRef Xu, F.-H., Xu, H., Lo, H.-K.: Protocol choice and parameter optimization in decoy-state measurement-device-independent quantum key distribution. Phys. Rev. A 89, 052333 (2014)ADSCrossRef
29.
Zurück zum Zitat Wang, Q., Zhang, C.-H., Wang, X.-B.: Scheme for realizing passive quantum key distribution with heralded single-photon sources. Phys. Rew. A 93, 032312 (2016)ADSCrossRef Wang, Q., Zhang, C.-H., Wang, X.-B.: Scheme for realizing passive quantum key distribution with heralded single-photon sources. Phys. Rew. A 93, 032312 (2016)ADSCrossRef
Metadaten
Titel
An improved proposal on the practical quantum key distribution with biased basis
verfasst von
Chen-Chen Mao
Jian Li
Jian-Rong Zhu
Chun-Mei Zhang
Qin Wang
Publikationsdatum
01.10.2017
Verlag
Springer US
Erschienen in
Quantum Information Processing / Ausgabe 10/2017
Print ISSN: 1570-0755
Elektronische ISSN: 1573-1332
DOI
https://doi.org/10.1007/s11128-017-1707-7

Weitere Artikel der Ausgabe 10/2017

Quantum Information Processing 10/2017 Zur Ausgabe

Neuer Inhalt