SECURITY OF PRACTICAL PHASE-CODING QUANTUM KEY DISTRIBUTION

被引:0
作者
Li, Hong-Wei [1 ,2 ]
Yin, Zhen-Qiang [1 ]
Han, Zheng-Fu [1 ]
Bao, Wan-Su [2 ]
Guo, Guang-Can [1 ]
机构
[1] Univ Sci & Technol China, Key Lab Quantum Informat, Hefei 230026, Peoples R China
[2] Informat Engineer Univ, Elect Technol Inst, Zhengzhou 450004, Peoples R China
基金
中国国家自然科学基金;
关键词
Security; quantum key distribution; phase-coding; unbalanced Mach-Zehnder interferometer; CRYPTOGRAPHY;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Security proof of practical quantum key distribution (QKD) has attracted a lot of attentions in recent years. Most of real-life QKD implementations are based on phase-coding BB84 protocol, which usually use Unbalanced Mach-Zehnder Interferometer (UMZI) as the information encoder and decoder. However, the long arm and short arm of UMZI will introduce different loss in practical experimental realizations, the state emitted by Alice's side is nolonger perfect BB84 states correspondingly. In this paper, we will give the security analysis in this situation. Counterintuitively, active compensation for this different loss will only lower the secret key bit rate.
引用
收藏
页码:771 / 779
页数:9
相关论文
共 21 条
[11]   Decoy state quantum key distribution [J].
Lo, HK ;
Ma, XF ;
Chen, K .
PHYSICAL REVIEW LETTERS, 2005, 94 (23)
[12]   Unconditional security of quantum key distribution over arbitrarily long distances [J].
Lo, HK ;
Chau, HF .
SCIENCE, 1999, 283 (5410) :2050-2056
[13]   Practical decoy state for quantum key distribution [J].
Ma, XF ;
Qi, B ;
Zhao, Y ;
Lo, HK .
PHYSICAL REVIEW A, 2005, 72 (01)
[14]   Faraday-Michelson system for quantum cryptography [J].
Mo, XF ;
Zhu, B ;
Han, ZF ;
Gui, YZ ;
Gun, GC .
OPTICS LETTERS, 2005, 30 (19) :2632-2634
[15]  
Renner R., 2005, QUANTPH0512258
[16]   The security of practical quantum key distribution [J].
Scarani, Valerio ;
Bechmann-Pasquinucci, Helle ;
Cerf, Nicolas J. ;
Dusek, Miloslav ;
Luetkenhaus, Norbert ;
Peev, Momtchil .
REVIEWS OF MODERN PHYSICS, 2009, 81 (03) :1301-1350
[17]   Simple proof of security of the BB84 quantum key distribution protocol [J].
Shor, PW ;
Preskill, J .
PHYSICAL REVIEW LETTERS, 2000, 85 (02) :441-444
[18]   Beating the photon-number-splitting attack in practical quantum cryptography [J].
Wang, XB .
PHYSICAL REVIEW LETTERS, 2005, 94 (23)
[19]   General theory of decoy-state quantum cryptography with source errors [J].
Wang, Xiang-Bin ;
Peng, Cheng-Zhi ;
Zhang, Jun ;
Yang, Lin ;
Pan, Jian-Wei .
PHYSICAL REVIEW A, 2008, 77 (04)
[20]   Decoy state quantum key distribution with modified coherent state [J].
Yin, Zhen-Qiang ;
Han, Zheng-Fu ;
Sun, Fang-Wen ;
Guo, Guang-Can .
PHYSICAL REVIEW A, 2007, 76 (01)