Practical round-robin differential-phase-shift quantum key distribution

被引:24
作者
Zhang, Zhen [1 ]
Yuan, Xiao [1 ]
Cao, Zhu [1 ]
Ma, Xiongfeng [1 ]
机构
[1] Tsinghua Univ, Inst Interdisciplinary Informat Sci, Ctr Quantum Informat, Beijing, Peoples R China
来源
NEW JOURNAL OF PHYSICS | 2017年 / 19卷
基金
中国国家自然科学基金;
关键词
quantum key distribution; decoy state; privacy amplification; UNCONDITIONAL SECURITY; PROOF;
D O I
10.1088/1367-2630/aa6274
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
The security of quantum key distribution (QKD) relies on the Heisenberg uncertainty principle, with which legitimate users are able to estimate information leakage by monitoring the disturbance of the transmitted quantum signals. Normally, the disturbance is reflected as bit flip errors in the sifted key; thus, privacy amplification, which removes any leaked information from the key, generally depends on the bit error rate. Recently, a round-robin differential-phase-shiftQKDprotocol for which privacy amplification does not rely on the bit error rate (Sasaki et al 2014 Nature 509 475) was proposed. The amount of leaked information can be bounded by the sender during the state-preparation stage and hence, is independent of the behavior of the unreliable quantum channel. In our work, we apply the tagging technique to the protocol and present a tight bound on the key rate and employ a decoy-state method. The effects of background noise and misalignment are taken into account under practical conditions. Our simulation results show that the protocol can tolerate channel error rates close to 50% within a typical experiment setting. That is, there is a negligible restriction on the error rate in practice.
引用
收藏
页数:11
相关论文
共 37 条
  • [1] Squashing models for optical measurements in quantum communication
    Beaudry, Normand J.
    Moroder, Tobias
    Lutkenhaus, Norbert
    [J]. PHYSICAL REVIEW LETTERS, 2008, 101 (09)
  • [2] Bennett C.H., 1984, PROC IEEE INT C COMP, P175, DOI DOI 10.1016/J.TCS.2014.05.025
  • [3] Limitations on practical quantum cryptography
    Brassard, G
    Lütkenhaus, N
    Mor, T
    Sanders, BC
    [J]. PHYSICAL REVIEW LETTERS, 2000, 85 (06) : 1330 - 1333
  • [4] Side-Channel-Free Quantum Key Distribution
    Braunstein, Samuel L.
    Pirandola, Stefano
    [J]. PHYSICAL REVIEW LETTERS, 2012, 108 (13)
  • [5] Discrete-phase-randomized coherent state source and its application in quantum key distribution
    Cao, Zhu
    Zhang, Zhen
    Lo, Hoi-Kwong
    Ma, Xiongfeng
    [J]. NEW JOURNAL OF PHYSICS, 2015, 17
  • [6] Chau H., 2016, ARXIV160808329
  • [7] Entanglement as a precondition for secure quantum key distribution -: art. no. 217903
    Curty, M
    Lewenstein, M
    Lütkenhaus, N
    [J]. PHYSICAL REVIEW LETTERS, 2004, 92 (21) : 217903 - 1
  • [8] QUANTUM CRYPTOGRAPHY BASED ON BELL THEOREM
    EKERT, AK
    [J]. PHYSICAL REVIEW LETTERS, 1991, 67 (06) : 661 - 663
  • [9] QUANTUM CRYPTOGRAPHY Round-robin with photons
    Froehlich, Bernd
    Yuan, Zhiliang
    [J]. NATURE PHOTONICS, 2015, 9 (12) : 781 - 782
  • [10] Universal squash model for optical communications using linear optics and threshold detectors
    Fung, Chi-Hang Fred
    Chau, H. F.
    Lo, Hoi-Kwong
    [J]. PHYSICAL REVIEW A, 2011, 84 (02):