Practical decoy state for quantum key distribution

被引:823
作者
Ma, XF [1 ]
Qi, B
Zhao, Y
Lo, HK
机构
[1] Univ Toronto, Dept Phys, Ctr Quantum Informat & Quantum Control, Toronto, ON M5S 3G4, Canada
[2] Univ Toronto, Dept Elect & Comp Engn, Toronto, ON M5S 3G4, Canada
基金
美国国家科学基金会;
关键词
D O I
10.1103/PhysRevA.72.012326
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
Decoy states have recently been proposed as a useful method for substantially improving the performance of quantum key distribution (QKD). Here, we present a general theory of the decoy state protocol based on only two decoy states and one signal state. We perform optimization on the choice of intensities of the two decoy states and the signal state. Our result shows that a decoy state protocol with only two types of decoy states-the vacuum and a weak decoy state-asymptotically approaches the theoretical limit of the most general type of decoy state protocol (with an infinite number of decoy states). We also present a one-decoy-state protocol. Moreover, we provide estimations on the effects of statistical fluctuations and suggest that, even for long-distance (larger than 100 km) QKD, our two-decoy-state protocol can be implemented with only a few hours of experimental data. In conclusion, decoy state quantum key distribution is highly practical.
引用
收藏
页数:15
相关论文
共 27 条
  • [1] Bennett C.H., 1984, P IEEE INT C COMP SY, P175, DOI DOI 10.1016/J.TCS.2014.05.025
  • [2] QUANTUM CRYPTOGRAPHY USING ANY 2 NONORTHOGONAL STATES
    BENNETT, CH
    [J]. PHYSICAL REVIEW LETTERS, 1992, 68 (21) : 3121 - 3124
  • [3] Biham E., 2000, Proceedings of the Thirty Second Annual ACM Symposium on Theory of Computing, P715, DOI 10.1145/335305.335406
  • [4] Experiments on long wavelength (1550nm) "plug and play" quantum cryptography systems
    Bourennane, M
    Gibson, F
    Karlsson, A
    Hening, A
    Jonsson, P
    Tsegaye, T
    Ljunggren, D
    Sundberg, E
    [J]. OPTICS EXPRESS, 1999, 4 (10): : 383 - 387
  • [5] Brassard G., 1994, LECT NOTES COMPUTER, V765, P410, DOI [DOI 10.1007/3-540-48285-7_35, 10.1007/3-540-48285-7_35]
  • [6] Quantum privacy amplification and the security of quantum cryptography over noisy channels (vol 77, pg 2818, 1996)
    Deutsch, D
    Ekert, A
    Jozsa, R
    Macchiavello, C
    Popescu, S
    Sanpera, A
    [J]. PHYSICAL REVIEW LETTERS, 1998, 80 (09) : 2022 - 2022
  • [7] Quantum privacy amplification and the security of quantum cryptography over noisy channels
    Deutsch, D
    Ekert, A
    Jozsa, R
    Macchiavello, C
    Popescu, S
    Sanpera, A
    [J]. PHYSICAL REVIEW LETTERS, 1996, 77 (13) : 2818 - 2821
  • [8] Quantum key distribution over 122 km of standard telecom fiber
    Gobby, C
    Yuan, ZL
    Shields, AJ
    [J]. APPLIED PHYSICS LETTERS, 2004, 84 (19) : 3762 - 3764
  • [9] Gottesman D, 2004, QUANTUM INF COMPUT, V4, P325
  • [10] HARRINGTON JW, QUANTPH0503002