An improved proposal on the practical quantum key distribution with biased basis

被引:10
作者
Mao, Chen-Chen [1 ,2 ]
Li, Jian [1 ,2 ,4 ]
Zhu, Jian-Rong [1 ,2 ]
Zhang, Chun-Mei [1 ,2 ,3 ]
Wang, Qin [1 ,2 ,3 ]
机构
[1] Nanjing Univ Posts & Telecommun, Inst Signal Proc Transmiss, Nanjing 210003, Jiangsu, Peoples R China
[2] Nanjing Univ Posts & Telecommun, Key Lab Broadband Wireless Commun & Sensor Networ, Minist Educ, Nanjing 210003, Jiangsu, Peoples R China
[3] Univ Sci & Technol China, CAS Key Lab Quantum Informat, Hefei 230026, Anhui, Peoples R China
[4] Southeast Univ, Dept Phys, Nanjing 210003, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
Quantum key distribution; Decoy state; Biased basis; UNCONDITIONAL SECURITY; PROOF;
D O I
10.1007/s11128-017-1707-7
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
In this manuscript, we propose an improved scheme on the decoy-state quantum key distribution (QKD) under practical experimental conditions with biased basis. Compared with the standard decoy-state method with biased basis (prepare signal pulses in both X and Z basis with certain probabilities, and weak decoy pulses as well), the difference here is, we prepare signal pulses in both X and Z basis, but the weak decoy state in only X basis. In the follow-up, we adopt this scheme to conducting numerical simulations on the QKD with the mostly often used source, i.e., weak coherent source by taking statistical fluctuations into account. Furthermore, we carry out full parameter optimization on it. Numerical simulation results demonstrate that our newscheme can present a higher key generation rate and a longer transmission distance compared with standard three-intensity decoy-statemethod with biased basis. Moreover, it shows drastically improved performance by conducting full parameter optimization in our new scheme compared with partial optimization.
引用
收藏
页数:10
相关论文
共 29 条
[1]  
[Anonymous], 1984, P IEEE INT C COMP, DOI DOI 10.1016/J.TCS.2014.05.025
[2]   Limitations on practical quantum cryptography [J].
Brassard, G ;
Lütkenhaus, N ;
Mor, T ;
Sanders, BC .
PHYSICAL REVIEW LETTERS, 2000, 85 (06) :1330-1333
[3]   First-principles study of the interfacial structures of Au/MgO(001) [J].
Chen, D. ;
Ma, X. L. ;
Wang, Y. M. .
PHYSICAL REVIEW B, 2007, 75 (12)
[4]   QUANTUM CRYPTOGRAPHY BASED ON BELL THEOREM [J].
EKERT, AK .
PHYSICAL REVIEW LETTERS, 1991, 67 (06) :661-663
[5]   Practical issues in quantum-key-distribution postprocessing [J].
Fung, Chi-Hang Fred ;
Ma, Xiongfeng ;
Chau, H. F. .
PHYSICAL REVIEW A, 2010, 81 (01)
[6]  
Gottesman D, 2004, QUANTUM INF COMPUT, V4, P325
[7]   Quantum key distribution with high loss: Toward global secure communication [J].
Hwang, WY .
PHYSICAL REVIEW LETTERS, 2003, 91 (05) :579011-579014
[8]   Concise security bounds for practical decoy-state quantum key distribution [J].
Lim, Charles Ci Wen ;
Curty, Marcos ;
Walenta, Nino ;
Xu, Feihu ;
Zbinden, Hugo .
PHYSICAL REVIEW A, 2014, 89 (02)
[9]   Decoy state quantum key distribution [J].
Lo, HK ;
Ma, XF ;
Chen, K .
PHYSICAL REVIEW LETTERS, 2005, 94 (23)
[10]   Efficient quantum key distribution scheme and a proof of its unconditional security [J].
Lo, HK ;
Chau, HF ;
Ardehali, M .
JOURNAL OF CRYPTOLOGY, 2005, 18 (02) :133-165