Two-Decoy-State Phase Matching Quantum Key Distribution Method

被引:0
作者
Zhou J. [1 ]
Zhou Y. [1 ]
Zhou X. [1 ]
Nie N. [1 ]
机构
[1] College of Electronic Engineering, Naval University of Engineering, Wuhan
来源
Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China | 2021年 / 50卷 / 05期
关键词
Decoy state; Phase matching protocol; Quantum key distribution; Quantum optics; Weak coherent state source;
D O I
10.12178/1001-0548.2021171
中图分类号
学科分类号
摘要
The phase matching protocol is a recent proposed quantum key distribution protocol that breaks the secret key capacity. Its security has been certified by theory and practice. For there is no ideal single photon source in practice, a two-decoy-states phase matching quantum key distribution method is proposed with a weak coherent state source. In this method, the parameters are estimated more easily for only two decoy states (vacuum+weak decoy state) should be taken into consideration that are necessary to solve the final key rate. Then we analyze the performance of the proposed method with fiber channel both in ideal and statistical fluctuation respectively. The simulation results show that the proposed method can break the secure key capacity and has higher key rate and longer max transmission distance than the BB84 (the protocol proposed by Bennett and Brassard in 1984) and measurement device independent protocols under the condition of the same number of decoy state. The proposed method approaches the existing three-decoy-states method in key rate and max transmission distance and breaks the secret key capacity. Taking the statistical fluctuation into consideration, the proposed method will have higher key rate and longer max transmission distance when the data size is less than 1014. © 2021, Editorial Board of Journal of the University of Electronic Science and Technology of China. All right reserved.
引用
收藏
页码:650 / 655
页数:5
相关论文
共 26 条
[11]  
PIRANDOLA S, LAURENZA R, OTTAVIANI C, Et al., Fundamental limits of repeaterless quantum communications, Nat Commun, 8, (2017)
[12]  
TAKEOKA M, GUHA S, WILDE M., Fundamental rate-loss trade off for optical quantum key distribution, Nat Commun, 5, (2014)
[13]  
LUCAMARINI M, YUAN Z L, DYNES J F, Et al., Overcoming the rate-distance limit of quantum key distribution without quantum repeaters, Nature, 557, 7705, (2018)
[14]  
MA X F, ZENG P, ZHOU H Y., Phase-Matching quantum key distribution, Phys Rev X, 8, 3, (2018)
[15]  
XU F H, MA X F, ZHANG Q, Et al., Secure quantum key distribution with realistic devices, Reviews of Modern Physics, 92, (2020)
[16]  
PFISTER C, COLESP J, WEHNER S, Et al., Sifting attacks in finite-size quantum key distribution, New J Phys, 18, 5, (2016)
[17]  
HUANG J Z, YIN Z Q, WANG S, Et al., Effect of intensity modulator extinction on practical quantum key distribution, Eur Phys J D, 66, 6, (2012)
[18]  
SUN S H, GAO M, JIANG M S, Et al., Partially random phase attack to the practical two-way quantum-key-distribution system, Phys Rev A, 85, 3, (2012)
[19]  
HWANG W Y., Quantum key distribution with high loss: Toward global secure communication, Phys Rev Lett, 91, (2003)
[20]  
LO H K, MA X F, CHEN K., Decoy state quantum key distribution, Phys Rev A, 94, (2005)