Discrete-phase-randomized coherent state source and its application in quantum key distribution

被引:80
作者
Cao, Zhu [1 ]
Zhang, Zhen [1 ]
Lo, Hoi-Kwong [2 ,3 ]
Ma, Xiongfeng [1 ]
机构
[1] Tsinghua Univ, Ctr Quantum Informat, Inst Interdisciplinary Informat Sci, Beijing 100084, Peoples R China
[2] Univ Toronto, Dept Phys, Ctr Quantum Informat & Quantum Control, Toronto, ON, Canada
[3] Univ Toronto, Dept Elect & Comp Engn, Toronto, ON, Canada
基金
加拿大自然科学与工程研究理事会;
关键词
quantum key distribution; coherent state; discrete phase randomization; decoy state; UNCONDITIONAL SECURITY; DISTRIBUTION PROTOCOL; CRYPTOGRAPHY; GENERATION; SCHEME; PROOF;
D O I
10.1088/1367-2630/17/5/053014
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Coherent state photon sources are widely used in quantum information processing. In many applications, such as quantum key distribution (QKD), a coherent state functions as a mixture of Fock states by assuming that its phase is continuously randomized. In practice, such a crucial assumption is often not satisfied, and therefore the security of existing QKD experiments is not guaranteed. To bridge this gap, we provide a rigorous security proof of QKD with discrete-phase-randomized coherent state sources. Our results show that the performance of the discrete-phase randomization case is close to its continuous counterpart with only a small number (say, 10) of discrete phases. Compared to the conventional continuous phase randomization case, where an infinite amount of random bits are required, our result shows that only a small amount (say, 4 bits) of randomness is needed.
引用
收藏
页数:16
相关论文
共 40 条
[1]   Ultra-fast quantum randomness generation by accelerated phase diffusion in a pulsed laser diode [J].
Abellan, C. ;
Amaya, W. ;
Jofre, M. ;
Curty, M. ;
Acin, A. ;
Capmany, J. ;
Pruneri, V. ;
Mitchell, M. W. .
OPTICS EXPRESS, 2014, 22 (02) :1645-1654
[2]  
Ben-Or M, 2005, LECT NOTES COMPUT SC, V3378, P386
[3]  
Bennett C. H., 2014, Theoretical computer science, P175, DOI [DOI 10.1016/J.TCS.2014.05.025, 10.1016/j.tcs.2014.05.025]
[4]   Limitations on practical quantum cryptography [J].
Brassard, G ;
Lütkenhaus, N ;
Mor, T ;
Sanders, BC .
PHYSICAL REVIEW LETTERS, 2000, 85 (06) :1330-1333
[5]   Blind Quantum Computing with Weak Coherent Pulses [J].
Dunjko, Vedran ;
Kashefi, Elham ;
Leverrier, Anthony .
PHYSICAL REVIEW LETTERS, 2012, 108 (20)
[6]   QUANTUM CRYPTOGRAPHY BASED ON BELL THEOREM [J].
EKERT, AK .
PHYSICAL REVIEW LETTERS, 1991, 67 (06) :661-663
[7]   Security proof of the unbalanced phase-encoded Bennett-Brassard 1984 protocol [J].
Ferenczi, Agnes ;
Narasimhachar, Varun ;
Luetkenhaus, Norbert .
PHYSICAL REVIEW A, 2012, 86 (04)
[8]   COHERENT AND INCOHERENT STATES OF RADIATION FIELD [J].
GLAUBER, RJ .
PHYSICAL REVIEW, 1963, 131 (06) :2766-+
[9]   Quantum key distribution over 122 km of standard telecom fiber [J].
Gobby, C ;
Yuan, ZL ;
Shields, AJ .
APPLIED PHYSICS LETTERS, 2004, 84 (19) :3762-3764
[10]  
Gottesman D, 2004, QUANTUM INF COMPUT, V4, P325