Nonorthogonal decoy-state quantum key distribution based on coherent-state superpositions

被引:2
|
作者
Sun Wei [1 ]
Yin Hua-Lei [2 ]
Sun Xiang-Xiang [1 ]
Chen Teng-Yun [2 ]
机构
[1] Univ Sci & Technol China, Dept Modern Phys, Hefei 230026, Peoples R China
[2] Univ Sci & Technol China, Hefei Natl Lab Phys Sci Microscale, Hefei 230026, Peoples R China
关键词
coherent-state superpositions; key generation rate; count rate; error rate; CRYPTOGRAPHY;
D O I
10.7498/aps.65.080301
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Nonorthogonal coded agreements and decoy state method can effectively protect the photon number against splitting attack. Owing to the fact that the component of single-photon in the coherent-state superposition (CSS) is as high as 90%, CSS has recently emerged as an alternative to single-photon qubits for quantum information processing and metrology. The approximate CSS of small amplitudes is generated by the subtraction of photons from a squeezed vacuum state, and the approximate CSS of large amplitude is generated from Fock state by using a single homodyne detection. Here, we combine both of the methods and propose a new protocol by using the CSS as a light source. We derive the secure key generation rate, the lower bound of count rate and upper bound of error rate of single-photon. We simulate the curves relationship between secure key generation rate and safety transmission distance in the case of an infinite number of decoy states by using matlab. The parameters are given according to the Gobby-Yuan-Shields (GYS) experiment. We infer that the safety transmission distance achieves 147.4 km and the secure key generation rate is much higher than those of other schemes. We also simulate the relationship between key generation rate and safety transmission distance in the case of a limited number of decoy states by using matlab. The parameters are given according to the GYS experiment too. When the N is 10(10), the safety transmission distance achieves 144 km; when the N is 10(9), the safety transmission distance achieves 139 km; when the N is 10(8) the safety transmission distance achieves 125.9 km. In this paper, we propose the use of CSS as the light source. Combining SARG04 agreements and decoy state, the scheme has the following advantages: first, the scheme which combines SARG04 agreements and decoy state method can effectively resist PNS; second, nonorthogonal decoy-state quantum key distribution based on coherent-state superpositions has a longer safety transmission distance and higher secure key generation rate than nonorthogonal decoy-state quantum key distribution based on weak coherent pulse and nonorthogonal decoy-state quantum key distribution based on conditionally prepared down-conversion source; third, nonorthogonal decoy-state quantum key distribution based on coherent-state super-positions is easier to prepare, which just needs one decoy state, than other schemes that require several decoy states. Obviously, our scheme can enhance the performance of quantum key distribution. Nonorthogonal decoy-state quantum key distribution based on coherent-state superpositions will have a very good application with the further development of preparation technology of CSS.
引用
收藏
页数:6
相关论文
共 27 条
  • [1] Simple and efficient quantum key distribution with parametric down-conversion
    Adachi, Yoritoshi
    Yamamoto, Takashi
    Koashi, Masato
    Imoto, Nobuyuki
    [J]. PHYSICAL REVIEW LETTERS, 2007, 99 (18)
  • [2] High-Fidelity Teleportation of Continuous-Variable Quantum States Using Delocalized Single Photons
    Andersen, Ulrik L.
    Ralph, Timothy C.
    [J]. PHYSICAL REVIEW LETTERS, 2013, 111 (05)
  • [3] [Anonymous], P IEEE INT C COMP SY
  • [4] Hybrid Long-Distance Entanglement Distribution Protocol
    Brask, J. B.
    Rigas, I.
    Polzik, E. S.
    Andersen, U. L.
    Sorensen, A. S.
    [J]. PHYSICAL REVIEW LETTERS, 2010, 105 (16)
  • [5] Limitations on practical quantum cryptography
    Brassard, G
    Lütkenhaus, N
    Mor, T
    Sanders, BC
    [J]. PHYSICAL REVIEW LETTERS, 2000, 85 (06) : 1330 - 1333
  • [6] QUANTUM CRYPTOGRAPHY BASED ON BELL THEOREM
    EKERT, AK
    [J]. PHYSICAL REVIEW LETTERS, 1991, 67 (06) : 661 - 663
  • [7] Performance of two quantum-key-distribution protocols
    Fung, CHF
    Tamaki, K
    Lo, HK
    [J]. PHYSICAL REVIEW A, 2006, 73 (01):
  • [8] Quantum key distribution over 122 km of standard telecom fiber
    Gobby, C
    Yuan, ZL
    Shields, AJ
    [J]. APPLIED PHYSICS LETTERS, 2004, 84 (19) : 3762 - 3764
  • [9] Nonorthogonal decoy-state quantum key distribution based on conditionally prepared down-conversion source
    Hu Hua-Peng
    Wang Jin-Dong
    Huang Yu-Xian
    Liu Song-Hao
    Lu Wei
    [J]. ACTA PHYSICA SINICA, 2010, 59 (01) : 287 - 292
  • [10] Quantum key distribution with high loss: Toward global secure communication
    Hwang, WY
    [J]. PHYSICAL REVIEW LETTERS, 2003, 91 (05) : 579011 - 579014