Nonorthogonal passive decoy-state quantum key distribution with a weak coherent state source

被引:6
作者
Zhou Yuan-Yuan [1 ]
Zhou Xue-Jun [1 ]
机构
[1] Naval Univ Engn, Sch Elect Engn, Dept Commun Engn, Wuhan 430033, Peoples R China
基金
国家高技术研究发展计划(863计划);
关键词
quantum optics; quantum key distribution; passive decoy state; key generation rate;
D O I
10.7498/aps.60.100301
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
A nonorthogonal passive decoy-state method is presented with a reconstructive weak coherent state source. The method dose not prepare decoy states actively and divides the receiver detection events into two groups, i. e., triggered components and nontriggered components, according to triggering situation of the sender detector. Both triggered and nontriggered components, as signal states and decoy states, are used to do some estimations and to generate secure key. The simulation results show that a better key generation rate and a longer secure transmission distance can be obtained with the nonorthogonal passive decoy-state method than with the existing passive methods, and that the performance is comparable to the theoretical limit of an active infinite decoy-state protocol. Furthermore, the nontriggered component contribution to key generation offsets the limitation of the detector low efficiency, and the performance of the method dose not depend on the detector efficiency of sender. Because decoy states need not be prepared actively, and our protocol is easy to implement and apply to quantum key distribution at high transmission rates.
引用
收藏
页数:6
相关论文
共 30 条
[1]   Simple and efficient quantum key distribution with parametric down-conversion [J].
Adachi, Yoritoshi ;
Yamamoto, Takashi ;
Koashi, Masato ;
Imoto, Nobuyuki .
PHYSICAL REVIEW LETTERS, 2007, 99 (18)
[2]  
Bennett C. H., 2014, Theoretical computer science, P175, DOI [DOI 10.1016/J.TCS.2014.05.025, 10.1016/j.tcs.2014.05.025]
[3]   Passive decoy-state quantum key distribution with practical light sources [J].
Curty, Marcos ;
Ma, Xiongfeng ;
Qi, Bing ;
Moroder, Tobias .
PHYSICAL REVIEW A, 2010, 81 (02)
[4]   Non-Poissonian statistics from Poissonian light sources with application to passive decoy state quantum key distribution [J].
Curty, Marcos ;
Moroder, Tobias ;
Ma, Xiongfeng ;
Luetkenhaus, Norbert .
OPTICS LETTERS, 2009, 34 (20) :3238-3240
[5]   Performance of two quantum-key-distribution protocols [J].
Fung, CHF ;
Tamaki, K ;
Lo, HK .
PHYSICAL REVIEW A, 2006, 73 (01)
[6]   Quantum key distribution over 122 km of standard telecom fiber [J].
Gobby, C ;
Yuan, ZL ;
Shields, AJ .
APPLIED PHYSICS LETTERS, 2004, 84 (19) :3762-3764
[7]  
Gottesman D, 2004, QUANTUM INF COMPUT, V4, P325
[8]   Nonorthogonal decoy-state quantum key distribution based on conditionally prepared down-conversion source [J].
Hu Hua-Peng ;
Wang Jin-Dong ;
Huang Yu-Xian ;
Liu Song-Hao ;
Lu Wei .
ACTA PHYSICA SINICA, 2010, 59 (01) :287-292
[9]   Reexamination of the decoy-state quantum key distribution with an unstable source [J].
Hu, Jia-Zhong ;
Wang, Xiang-Bin .
PHYSICAL REVIEW A, 2010, 82 (01)
[10]   Quantum key distribution with high loss: Toward global secure communication [J].
Hwang, WY .
PHYSICAL REVIEW LETTERS, 2003, 91 (05) :579011-579014