Overview of applications of heralded single photon source in quantum key distribution

被引:1
|
作者
Meng Jie [1 ,2 ]
Xu Le-Chen [1 ,2 ]
Zhang Cheng-Jun [1 ,2 ]
Zhang Chun-Hui [1 ,2 ]
Wang Qin [1 ,2 ]
机构
[1] Nanjing Univ Posts & Telecommunicat, Inst Quantum Informat & Technol, Nanjing 210003, Peoples R China
[2] Nanjing Univ Posts & Telecommunicat, Key Lab Broadband Wireless Commun & Sensor Networ, Minist Educ, Nanjing 210003, Peoples R China
基金
中国国家自然科学基金;
关键词
quantum key distribution; heralded single photon source; weak coherent state light source; passive decoy state; CRYPTOGRAPHY; ATTACK;
D O I
10.7498/aps.71.20220344
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
In this paper, we mainly introduce the preparation and physical properties of the heralded single-photon source, the development history and its applications in three typical quantum key distribution protocols, including BB84, measurement-device-independent and twin-field quantum key distribution protocols. Moreover, we make comparisons of the above quantum key distribution protocols between using heralded single-photon source and using weak coherent sources, and analyze their advantages and disadvantages. Besides, according to the characteristics of single-photon interference in twin-field quantum key distributions, the limitations of separately applying heralded single-photon sources to twin-field quantum key distributions are revealed, and possible solutions are discussed. Therefore, this work may provide valuable references and help for the practical implementation of quantum secure communication in the near future.
引用
收藏
页数:11
相关论文
共 64 条
  • [1] High-visibility two-photon interference at a telecom wavelength using picosecond-regime separated sources
    Aboussouan, Pierre
    Alibart, Olivier
    Ostrowsky, Daniel B.
    Baldi, Pascal
    Tanzilli, Sebastien
    [J]. PHYSICAL REVIEW A, 2010, 81 (02):
  • [2] Measurement-device-independent quantum key distribution with quantum memories
    Abruzzo, Silvestre
    Kampermann, Hermann
    Bruss, Dagmar
    [J]. PHYSICAL REVIEW A, 2014, 89 (01)
  • [3] Simple and efficient quantum key distribution with parametric down-conversion
    Adachi, Yoritoshi
    Yamamoto, Takashi
    Koashi, Masato
    Imoto, Nobuyuki
    [J]. PHYSICAL REVIEW LETTERS, 2007, 99 (18)
  • [4] Bennett C. H., 1984, P IEEE INT C COMP SY, P175, DOI DOI 10.1016/J.TCS.2014.05.025
  • [5] QUANTUM CRYPTOGRAPHY USING ANY 2 NONORTHOGONAL STATES
    BENNETT, CH
    [J]. PHYSICAL REVIEW LETTERS, 1992, 68 (21) : 3121 - 3124
  • [6] QUANTUM CRYPTOGRAPHY WITHOUT BELL THEOREM
    BENNETT, CH
    BRASSARD, G
    MERMIN, ND
    [J]. PHYSICAL REVIEW LETTERS, 1992, 68 (05) : 557 - 559
  • [7] Highly efficient heralded single-photon source for telecom wavelengths based on a PPLN waveguide
    Bock, Matthias
    Lenhard, Andreas
    Chunnilall, Christopher
    Becher, Christoph
    [J]. OPTICS EXPRESS, 2016, 24 (21): : 23992 - 24001
  • [8] Limitations on practical quantum cryptography
    Brassard, G
    Lütkenhaus, N
    Mor, T
    Sanders, BC
    [J]. PHYSICAL REVIEW LETTERS, 2000, 85 (06) : 1330 - 1333
  • [9] Side-Channel-Free Quantum Key Distribution
    Braunstein, Samuel L.
    Pirandola, Stefano
    [J]. PHYSICAL REVIEW LETTERS, 2012, 108 (13)
  • [10] Optimal eavesdropping in quantum cryptography with six states
    Bruss, D
    [J]. PHYSICAL REVIEW LETTERS, 1998, 81 (14) : 3018 - 3021