Skip to main content
Top
Published in: Quantum Information Processing 10/2017

01-10-2017

Parameter optimization in biased decoy-state quantum key distribution with both source errors and statistical fluctuations

Authors: Jian-Rong Zhu, Jian Li, Chun-Mei Zhang, Qin Wang

Published in: Quantum Information Processing | Issue 10/2017

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The decoy-state method has been widely used in commercial quantum key distribution (QKD) systems. In view of the practical decoy-state QKD with both source errors and statistical fluctuations, we propose a universal model of full parameter optimization in biased decoy-state QKD with phase-randomized sources. Besides, we adopt this model to carry out simulations of two widely used sources: weak coherent source (WCS) and heralded single-photon source (HSPS). Results show that full parameter optimization can significantly improve not only the secure transmission distance but also the final key generation rate. And when taking source errors and statistical fluctuations into account, the performance of decoy-state QKD using HSPS suffered less than that of decoy-state QKD using WCS.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing. IEEE, New York, pp. 175–179 (1984) Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing. IEEE, New York, pp. 175–179 (1984)
2.
go back to reference Lo, H.-K., Chau, H.F.: Unconditional security of quantum key distribution over arbitrarily long distances. Science 283, 2050 (1999)ADSCrossRef Lo, H.-K., Chau, H.F.: Unconditional security of quantum key distribution over arbitrarily long distances. Science 283, 2050 (1999)ADSCrossRef
3.
go back to reference Shor, P.W., Preskill, J.: Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85, 441 (2000)ADSCrossRef Shor, P.W., Preskill, J.: Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85, 441 (2000)ADSCrossRef
5.
go back to reference Lo, H.-K., Chau, H.F., Ardehali, M.: Efficient quantum key distribution scheme and a proof of its unconditional security. J. Cryptol. 18, 133–165 (2005)MathSciNetCrossRefMATH Lo, H.-K., Chau, H.F., Ardehali, M.: Efficient quantum key distribution scheme and a proof of its unconditional security. J. Cryptol. 18, 133–165 (2005)MathSciNetCrossRefMATH
6.
go back to reference Brassard, G., Lütkenhaus, N., Mor, T., Sanders, B.C.: Limitations on practical quantum cryptography. Phys. Rev. Lett. 85, 1330 (2000)ADSCrossRefMATH Brassard, G., Lütkenhaus, N., Mor, T., Sanders, B.C.: Limitations on practical quantum cryptography. Phys. Rev. Lett. 85, 1330 (2000)ADSCrossRefMATH
7.
go back to reference Lütkenhaus, N.: Security against individual attacks for realistic quantum key distribution. Phys. Rev. A 61, 052304 (2000)ADSCrossRef Lütkenhaus, N.: Security against individual attacks for realistic quantum key distribution. Phys. Rev. A 61, 052304 (2000)ADSCrossRef
8.
go back to reference Lütkenhaus, N., Jahma, M.: Quantum key distribution with realistic states: photon-number statistics in the photon-number splitting attack. N. J. Phys. 4, 44.1 (2002)CrossRef Lütkenhaus, N., Jahma, M.: Quantum key distribution with realistic states: photon-number statistics in the photon-number splitting attack. N. J. Phys. 4, 44.1 (2002)CrossRef
9.
go back to reference Hwang, W.Y.: Quantum key distribution with high loss: toward global secure communication. Phys. Rev. Lett. 91, 057901 (2003)ADSCrossRef Hwang, W.Y.: Quantum key distribution with high loss: toward global secure communication. Phys. Rev. Lett. 91, 057901 (2003)ADSCrossRef
10.
go back to reference Wang, X.-B.: Beating the photon-number-splitting attack in practical quantum cryptography. Phys. Rev. Lett. 94, 230503 (2005)ADSCrossRef Wang, X.-B.: Beating the photon-number-splitting attack in practical quantum cryptography. Phys. Rev. Lett. 94, 230503 (2005)ADSCrossRef
11.
go back to reference Lo, H.-K., Ma, X.-F., Chen, K.: Decoy state quantum key distribution. Phys. Rev. Lett. 94, 230504 (2005)ADSCrossRef Lo, H.-K., Ma, X.-F., Chen, K.: Decoy state quantum key distribution. Phys. Rev. Lett. 94, 230504 (2005)ADSCrossRef
12.
go back to reference Wang, Q., Wang, X.-B., Guo, G.-C.: Practical decoy-state method in quantum key distribution with a heralded single-photon source. Phys. Rev. A 75, 012312 (2007)ADSCrossRef Wang, Q., Wang, X.-B., Guo, G.-C.: Practical decoy-state method in quantum key distribution with a heralded single-photon source. Phys. Rev. A 75, 012312 (2007)ADSCrossRef
13.
go back to reference Wang, Q., Wang, X.-B.: Improved practical decoy state method in quantum key distribution with parametric down-conversion source. Europhys. Lett. 79, 40001 (2007)ADSMathSciNetCrossRef Wang, Q., Wang, X.-B.: Improved practical decoy state method in quantum key distribution with parametric down-conversion source. Europhys. Lett. 79, 40001 (2007)ADSMathSciNetCrossRef
14.
go back to reference Wang, Q., Chen, W., Xavier, et al.: Experimental decoy-state quantum key distribution with a sub-Poissionian heralded single-photon source. Phys. Rev. Lett. 100, 090501 (2008)ADSCrossRef Wang, Q., Chen, W., Xavier, et al.: Experimental decoy-state quantum key distribution with a sub-Poissionian heralded single-photon source. Phys. Rev. Lett. 100, 090501 (2008)ADSCrossRef
15.
go back to reference Lo, H.K., Curty, M., Qi, B.: Measurement-device-independent quantum key distribution. Phys. Rev. Lett. 108, 130503 (2012)ADSCrossRef Lo, H.K., Curty, M., Qi, B.: Measurement-device-independent quantum key distribution. Phys. Rev. Lett. 108, 130503 (2012)ADSCrossRef
16.
go back to reference Zhou, Y.-H., Yu, Z.-W., Wang, X.-B.: Tightened estimation can improve the key rate of measurement-device-independent quantum key distribution by more than 100. Phys. Rev. A 89, 052325 (2014)ADSCrossRef Zhou, Y.-H., Yu, Z.-W., Wang, X.-B.: Tightened estimation can improve the key rate of measurement-device-independent quantum key distribution by more than 100. Phys. Rev. A 89, 052325 (2014)ADSCrossRef
17.
go back to reference Wang, X.B.: Measurement-device-independent quantum key distribution. Phys. Rev. A 87, 012320 (2013)ADSCrossRef Wang, X.B.: Measurement-device-independent quantum key distribution. Phys. Rev. A 87, 012320 (2013)ADSCrossRef
18.
go back to reference Tamaki, K., Lo, H.-K., Fung, C.-H.F., Qi, B.: Phase encoding schemes for measurement-device-independent quantum key distribution with basis-dependent flaw. Phys. Rev. A 85, 042307 (2012)ADSCrossRef Tamaki, K., Lo, H.-K., Fung, C.-H.F., Qi, B.: Phase encoding schemes for measurement-device-independent quantum key distribution with basis-dependent flaw. Phys. Rev. A 85, 042307 (2012)ADSCrossRef
19.
go back to reference Ma, X., Razavi, M.: Alternative schemes for measurement-device-independent quantum key distribution. Phys. Rev. A 86, 062319 (2012)ADSCrossRef Ma, X., Razavi, M.: Alternative schemes for measurement-device-independent quantum key distribution. Phys. Rev. A 86, 062319 (2012)ADSCrossRef
20.
go back to reference Wang, Q., Wang, X.-B.: An efficient implementation of the decoy-state measurement-device-independent quantum key distribution with heralded single-photon sources. Phys. Rev. A 88, 052332 (2013)ADSCrossRef Wang, Q., Wang, X.-B.: An efficient implementation of the decoy-state measurement-device-independent quantum key distribution with heralded single-photon sources. Phys. Rev. A 88, 052332 (2013)ADSCrossRef
21.
go back to reference Wang, Q., Wang, X.-B.: Simulating of the measurement-device independent quantum key distribution with phase randomized general sources. Sci. Rep. 4, 04612 (2014)ADSCrossRef Wang, Q., Wang, X.-B.: Simulating of the measurement-device independent quantum key distribution with phase randomized general sources. Sci. Rep. 4, 04612 (2014)ADSCrossRef
22.
go back to reference Zhu, J.-R., Zhu, F., Zhou, X.-Y., Wang, Q.: The enhanced measurement-device-independent quantum key distribution with two-intensity decoy states. Quantum Inf. Process. 15, 3799–3813 (2016)ADSMathSciNetCrossRefMATH Zhu, J.-R., Zhu, F., Zhou, X.-Y., Wang, Q.: The enhanced measurement-device-independent quantum key distribution with two-intensity decoy states. Quantum Inf. Process. 15, 3799–3813 (2016)ADSMathSciNetCrossRefMATH
23.
go back to reference Wang, D., Li, M., Zhu, F., Yin, Z.-Q., Chen, W., Han, Z.-F., Guo, G.-C., Wang, Q.: Quantum key distribution with the single-photon-added coherent source. Phys. Rev. A 90, 062315 (2014)ADSCrossRef Wang, D., Li, M., Zhu, F., Yin, Z.-Q., Chen, W., Han, Z.-F., Guo, G.-C., Wang, Q.: Quantum key distribution with the single-photon-added coherent source. Phys. Rev. A 90, 062315 (2014)ADSCrossRef
24.
go back to reference Wang, X.-B., Yang, L., Peng, C.-Z., Pan, J.-W.: Decoy-state quantum key distribution with both source errors and statistical fluctuations. N. J. Phys. 11, 075006 (2009)CrossRef Wang, X.-B., Yang, L., Peng, C.-Z., Pan, J.-W.: Decoy-state quantum key distribution with both source errors and statistical fluctuations. N. J. Phys. 11, 075006 (2009)CrossRef
25.
go back to reference Ma, X., Fung, C.-H.F., Razavi, M.: Statistical fluctuation analysis for measurement-device-independent quantum key distribution. Phys. Rev. A 86, 052305 (2012)ADSCrossRef Ma, X., Fung, C.-H.F., Razavi, M.: Statistical fluctuation analysis for measurement-device-independent quantum key distribution. Phys. Rev. A 86, 052305 (2012)ADSCrossRef
26.
go back to reference Yu, Z.W., Zhou, Y.H., Wang, X.B.: Statistical fluctuation analysis for measurement-device-independent quantum key distribution with three-intensity decoy-state method. Phys. Rev. A 91, 032318 (2015)ADSCrossRef Yu, Z.W., Zhou, Y.H., Wang, X.B.: Statistical fluctuation analysis for measurement-device-independent quantum key distribution with three-intensity decoy-state method. Phys. Rev. A 91, 032318 (2015)ADSCrossRef
27.
go back to reference Fung, C.-H.F., Ma, X., Chau, H.F.: Practical issues in quantum-key-distribution postprocessing. Phys. Rev. A 81, 012318 (2010)ADSCrossRef Fung, C.-H.F., Ma, X., Chau, H.F.: Practical issues in quantum-key-distribution postprocessing. Phys. Rev. A 81, 012318 (2010)ADSCrossRef
28.
go back to reference Gottesman, D., Lo, H.-K., Lütkenhaus, N., Preskill, J.: Security of quantum key distribution with imperfect devices. Quantum Inf. Comput. 4, 325 (2004)MathSciNetMATH Gottesman, D., Lo, H.-K., Lütkenhaus, N., Preskill, J.: Security of quantum key distribution with imperfect devices. Quantum Inf. Comput. 4, 325 (2004)MathSciNetMATH
29.
go back to reference Xu, F., Xu, H., Lo, H.-K.: Protocol choice and parameter optimization in decoy-state measurement-device-independent quantum key distribution. Phys. Rev. A 89, 052333 (2014)ADSCrossRef Xu, F., Xu, H., Lo, H.-K.: Protocol choice and parameter optimization in decoy-state measurement-device-independent quantum key distribution. Phys. Rev. A 89, 052333 (2014)ADSCrossRef
30.
go back to reference Wang, Q., Zhang, C.-H., Wang, X.-B.: Scheme for realizing passive quantum key distribution with heralded single-photon sources. Phys. Rev. A 93, 032312 (2016)ADSCrossRef Wang, Q., Zhang, C.-H., Wang, X.-B.: Scheme for realizing passive quantum key distribution with heralded single-photon sources. Phys. Rev. A 93, 032312 (2016)ADSCrossRef
31.
go back to reference Wang, S., Chen, W., Yin, Z.-Q., Li, H.-W., He, D.-Y., Li, Y.-H., Zhou, Z., Song, X.-T., Li, F.-Y., Wang, D., Chen, H., Han, Y.-G., Huang, J.-Z., Guo, J.-F., Hao, P.-L., Li, M., Zhang, C.-M., Liu, D., Liang, W.-Y., Miao, C.-H., Wu, P., Guo, G.-C., Han, Z.-F.: Field and long-term demonstration of a wide area quantum key distribution network. Opt. Express 22, 21739 (2014)ADSCrossRef Wang, S., Chen, W., Yin, Z.-Q., Li, H.-W., He, D.-Y., Li, Y.-H., Zhou, Z., Song, X.-T., Li, F.-Y., Wang, D., Chen, H., Han, Y.-G., Huang, J.-Z., Guo, J.-F., Hao, P.-L., Li, M., Zhang, C.-M., Liu, D., Liang, W.-Y., Miao, C.-H., Wu, P., Guo, G.-C., Han, Z.-F.: Field and long-term demonstration of a wide area quantum key distribution network. Opt. Express 22, 21739 (2014)ADSCrossRef
32.
go back to reference Wang, Y., Bao, W.-S., Zhou, C., Jiang, M.-S., Li, H.-W.: Tight finite-key analysis of a practical decoy-state quantum key distribution with unstable sources. Phys. Rev. A 94, 032335 (2016)ADSCrossRef Wang, Y., Bao, W.-S., Zhou, C., Jiang, M.-S., Li, H.-W.: Tight finite-key analysis of a practical decoy-state quantum key distribution with unstable sources. Phys. Rev. A 94, 032335 (2016)ADSCrossRef
Metadata
Title
Parameter optimization in biased decoy-state quantum key distribution with both source errors and statistical fluctuations
Authors
Jian-Rong Zhu
Jian Li
Chun-Mei Zhang
Qin Wang
Publication date
01-10-2017
Publisher
Springer US
Published in
Quantum Information Processing / Issue 10/2017
Print ISSN: 1570-0755
Electronic ISSN: 1573-1332
DOI
https://doi.org/10.1007/s11128-017-1687-7

Other articles of this Issue 10/2017

Quantum Information Processing 10/2017 Go to the issue