Practical round-robin differential-phase-shift quantum key distribution

被引:24
作者
Zhang, Zhen [1 ]
Yuan, Xiao [1 ]
Cao, Zhu [1 ]
Ma, Xiongfeng [1 ]
机构
[1] Tsinghua Univ, Inst Interdisciplinary Informat Sci, Ctr Quantum Informat, Beijing, Peoples R China
来源
NEW JOURNAL OF PHYSICS | 2017年 / 19卷
基金
中国国家自然科学基金;
关键词
quantum key distribution; decoy state; privacy amplification; UNCONDITIONAL SECURITY; PROOF;
D O I
10.1088/1367-2630/aa6274
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
The security of quantum key distribution (QKD) relies on the Heisenberg uncertainty principle, with which legitimate users are able to estimate information leakage by monitoring the disturbance of the transmitted quantum signals. Normally, the disturbance is reflected as bit flip errors in the sifted key; thus, privacy amplification, which removes any leaked information from the key, generally depends on the bit error rate. Recently, a round-robin differential-phase-shiftQKDprotocol for which privacy amplification does not rely on the bit error rate (Sasaki et al 2014 Nature 509 475) was proposed. The amount of leaked information can be bounded by the sender during the state-preparation stage and hence, is independent of the behavior of the unreliable quantum channel. In our work, we apply the tagging technique to the protocol and present a tight bound on the key rate and employ a decoy-state method. The effects of background noise and misalignment are taken into account under practical conditions. Our simulation results show that the protocol can tolerate channel error rates close to 50% within a typical experiment setting. That is, there is a negligible restriction on the error rate in practice.
引用
收藏
页数:11
相关论文
共 37 条
  • [11] Squashing model for detectors and applications to quantum-key-distribution protocols
    Gittsovich, O.
    Beaudry, N. J.
    Narasimhachar, V.
    Alvarez, R. Romero
    Moroder, T.
    Luetkenhaus, N.
    [J]. PHYSICAL REVIEW A, 2014, 89 (01):
  • [12] Quantum key distribution over 122 km of standard telecom fiber
    Gobby, C
    Yuan, ZL
    Shields, AJ
    [J]. APPLIED PHYSICS LETTERS, 2004, 84 (19) : 3762 - 3764
  • [13] Gottesman D, 2004, QUANTUM INF COMPUT, V4, P325
  • [14] Proof of security of quantum key distribution with two-way classical communications
    Gottesman, D
    Lo, HK
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2003, 49 (02) : 457 - 475
  • [15] Experimental Passive Round-Robin Differential Phase-Shift Quantum Key Distribution
    Guan, Jian-Yu
    Cao, Zhu
    Liu, Yang
    Shen-Tu, Guo-Liang
    Pelc, Jason S.
    Fejer, M. M.
    Peng, Cheng-Zhi
    Ma, Xiongfeng
    Zhang, Qiang
    Pan, Jian-Wei
    [J]. PHYSICAL REVIEW LETTERS, 2015, 114 (18)
  • [16] Quantum key distribution with high loss: Toward global secure communication
    Hwang, WY
    [J]. PHYSICAL REVIEW LETTERS, 2003, 91 (05) : 579011 - 579014
  • [17] Simple security proof of quantum key distribution based on complementarity
    Koashi, M.
    [J]. NEW JOURNAL OF PHYSICS, 2009, 11
  • [18] Testing models of vacuum energy interacting with cold dark matter
    Li, Yun-He
    Zhang, Jing-Fei
    Zhang, Xin
    [J]. PHYSICAL REVIEW D, 2016, 93 (02)
  • [19] Experimental Measurement-Device-Independent Quantum Key Distribution
    Liu, Yang
    Chen, Teng-Yun
    Wang, Liu-Jun
    Liang, Hao
    Shentu, Guo-Liang
    Wang, Jian
    Cui, Ke
    Yin, Hua-Lei
    Liu, Nai-Le
    Li, Li
    Ma, Xiongfeng
    Pelc, Jason S.
    Fejer, M. M.
    Peng, Cheng-Zhi
    Zhang, Qiang
    Pan, Jian-Wei
    [J]. PHYSICAL REVIEW LETTERS, 2013, 111 (13)
  • [20] Decoy state quantum key distribution
    Lo, HK
    Ma, XF
    Chen, K
    [J]. PHYSICAL REVIEW LETTERS, 2005, 94 (23)