Two-Decoy-State Phase Matching Quantum Key Distribution Method

被引:0
作者
Zhou J. [1 ]
Zhou Y. [1 ]
Zhou X. [1 ]
Nie N. [1 ]
机构
[1] College of Electronic Engineering, Naval University of Engineering, Wuhan
来源
Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China | 2021年 / 50卷 / 05期
关键词
Decoy state; Phase matching protocol; Quantum key distribution; Quantum optics; Weak coherent state source;
D O I
10.12178/1001-0548.2021171
中图分类号
学科分类号
摘要
The phase matching protocol is a recent proposed quantum key distribution protocol that breaks the secret key capacity. Its security has been certified by theory and practice. For there is no ideal single photon source in practice, a two-decoy-states phase matching quantum key distribution method is proposed with a weak coherent state source. In this method, the parameters are estimated more easily for only two decoy states (vacuum+weak decoy state) should be taken into consideration that are necessary to solve the final key rate. Then we analyze the performance of the proposed method with fiber channel both in ideal and statistical fluctuation respectively. The simulation results show that the proposed method can break the secure key capacity and has higher key rate and longer max transmission distance than the BB84 (the protocol proposed by Bennett and Brassard in 1984) and measurement device independent protocols under the condition of the same number of decoy state. The proposed method approaches the existing three-decoy-states method in key rate and max transmission distance and breaks the secret key capacity. Taking the statistical fluctuation into consideration, the proposed method will have higher key rate and longer max transmission distance when the data size is less than 1014. © 2021, Editorial Board of Journal of the University of Electronic Science and Technology of China. All right reserved.
引用
收藏
页码:650 / 655
页数:5
相关论文
共 26 条
[1]  
ARTUR K, EKERT, Quantum cryptography based on bell's theorem, Phys Rev Lett, 67, pp. 661-663, (1991)
[2]  
CHEN Y A, ZHANG Q, CHEN T Y, Et al., An integrated space-to-ground quantum communication network over 4600 kilometers, Nature, 589, 7841, (2021)
[3]  
POPPE A, PEEV M, MAURHART O, Et al., Outline of the SECOQC quantum-key-distribution network in Vienna, International Journal of Quantum Information, 6, 2, pp. 209-218, (2008)
[4]  
MA X F, QI B, ZHAO Y, Et al., Practical decoy state for quantum key distribution, Phys Rev A, 72, (2005)
[5]  
YIN J, CAO Y, LI Y H, Et al., Satellite-to-Ground entanglement-based quantum key distribution, Phys Rev Lett, 119, 20, (2017)
[6]  
BENNETT C H, BRASSARD G., Quantum cryptography: Public key distribution and coin tossing, Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing, pp. 175-179, (1984)
[7]  
MAO C C., The realistic safety analysis and calculation of the new quantum key distribution protocol, (2019)
[8]  
LO H K, CURY M, BING Q., Measurement-device-independent quantum key distribution, Phys Rev Lett, 108, 13, (2012)
[9]  
SCARANI V, ACIN A, RIBORDY G, Et al., Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulses implementations, Phys Rev Lett, 92, (2004)
[10]  
MA X F, RAZAVI M., Alternative schemes for measurement device independent quantum key distribution, Phys Rev A, 86, 6, pp. 3818-3821, (2012)