Practical round-robin differential-phase-shift quantum key distribution

被引:24
作者
Zhang, Zhen [1 ]
Yuan, Xiao [1 ]
Cao, Zhu [1 ]
Ma, Xiongfeng [1 ]
机构
[1] Tsinghua Univ, Inst Interdisciplinary Informat Sci, Ctr Quantum Informat, Beijing, Peoples R China
基金
中国国家自然科学基金;
关键词
quantum key distribution; decoy state; privacy amplification; UNCONDITIONAL SECURITY; PROOF;
D O I
10.1088/1367-2630/aa6274
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
The security of quantum key distribution (QKD) relies on the Heisenberg uncertainty principle, with which legitimate users are able to estimate information leakage by monitoring the disturbance of the transmitted quantum signals. Normally, the disturbance is reflected as bit flip errors in the sifted key; thus, privacy amplification, which removes any leaked information from the key, generally depends on the bit error rate. Recently, a round-robin differential-phase-shiftQKDprotocol for which privacy amplification does not rely on the bit error rate (Sasaki et al 2014 Nature 509 475) was proposed. The amount of leaked information can be bounded by the sender during the state-preparation stage and hence, is independent of the behavior of the unreliable quantum channel. In our work, we apply the tagging technique to the protocol and present a tight bound on the key rate and employ a decoy-state method. The effects of background noise and misalignment are taken into account under practical conditions. Our simulation results show that the protocol can tolerate channel error rates close to 50% within a typical experiment setting. That is, there is a negligible restriction on the error rate in practice.
引用
收藏
页数:11
相关论文
共 37 条
[11]   Squashing model for detectors and applications to quantum-key-distribution protocols [J].
Gittsovich, O. ;
Beaudry, N. J. ;
Narasimhachar, V. ;
Alvarez, R. Romero ;
Moroder, T. ;
Luetkenhaus, N. .
PHYSICAL REVIEW A, 2014, 89 (01)
[12]   Quantum key distribution over 122 km of standard telecom fiber [J].
Gobby, C ;
Yuan, ZL ;
Shields, AJ .
APPLIED PHYSICS LETTERS, 2004, 84 (19) :3762-3764
[13]  
Gottesman D, 2004, QUANTUM INF COMPUT, V4, P325
[14]   Proof of security of quantum key distribution with two-way classical communications [J].
Gottesman, D ;
Lo, HK .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2003, 49 (02) :457-475
[15]   Experimental Passive Round-Robin Differential Phase-Shift Quantum Key Distribution [J].
Guan, Jian-Yu ;
Cao, Zhu ;
Liu, Yang ;
Shen-Tu, Guo-Liang ;
Pelc, Jason S. ;
Fejer, M. M. ;
Peng, Cheng-Zhi ;
Ma, Xiongfeng ;
Zhang, Qiang ;
Pan, Jian-Wei .
PHYSICAL REVIEW LETTERS, 2015, 114 (18)
[16]   Quantum key distribution with high loss: Toward global secure communication [J].
Hwang, WY .
PHYSICAL REVIEW LETTERS, 2003, 91 (05) :579011-579014
[17]   Simple security proof of quantum key distribution based on complementarity [J].
Koashi, M. .
NEW JOURNAL OF PHYSICS, 2009, 11
[18]   Testing models of vacuum energy interacting with cold dark matter [J].
Li, Yun-He ;
Zhang, Jing-Fei ;
Zhang, Xin .
PHYSICAL REVIEW D, 2016, 93 (02)
[19]   Experimental Measurement-Device-Independent Quantum Key Distribution [J].
Liu, Yang ;
Chen, Teng-Yun ;
Wang, Liu-Jun ;
Liang, Hao ;
Shentu, Guo-Liang ;
Wang, Jian ;
Cui, Ke ;
Yin, Hua-Lei ;
Liu, Nai-Le ;
Li, Li ;
Ma, Xiongfeng ;
Pelc, Jason S. ;
Fejer, M. M. ;
Peng, Cheng-Zhi ;
Zhang, Qiang ;
Pan, Jian-Wei .
PHYSICAL REVIEW LETTERS, 2013, 111 (13)
[20]   Decoy state quantum key distribution [J].
Lo, HK ;
Ma, XF ;
Chen, K .
PHYSICAL REVIEW LETTERS, 2005, 94 (23)