Passive decoy-state quantum key distribution with practical light sources

被引:63
作者
Curty, Marcos [1 ]
Ma, Xiongfeng [2 ,3 ]
Qi, Bing [4 ,5 ]
Moroder, Tobias [2 ,3 ,6 ,7 ]
机构
[1] Univ Vigo, Dept Signal Theory & Commun, ETSI Telecomunicac, E-36310 Vigo, Pontevedra, Spain
[2] Univ Waterloo, Inst Quantum Comp, Waterloo, ON N2L 3G1, Canada
[3] Univ Waterloo, Dept Phys & Astron, Waterloo, ON N2L 3G1, Canada
[4] Univ Toronto, Ctr Quantum Informat & Quantum Control, Dept Phys, Toronto, ON M5S 3G4, Canada
[5] Univ Toronto, Dept Elect & Comp Engn, Toronto, ON M5S 3G4, Canada
[6] Univ Erlangen Nurnberg, Quantum Informat Theory Grp, Inst Theoret Phys 1, D-91058 Erlangen, Germany
[7] Max Planck Inst Sci Light, D-91058 Erlangen, Germany
基金
加拿大自然科学与工程研究理事会;
关键词
SECURITY;
D O I
10.1103/PhysRevA.81.022310
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
Decoy states have been proven to be a very useful method for significantly enhancing the performance of quantum key distribution systems with practical light sources. Although active modulation of the intensity of the laser pulses is an effective way of preparing decoy states in principle, in practice passive preparation might be desirable in some scenarios. Typical passive schemes involve parametric down-conversion. More recently, it has been shown that phase-randomized weak coherent pulses (WCP) can also be used for the same purpose [M. Curty et al., Opt. Lett. 34, 3238 (2009).] This proposal requires only linear optics together with a simple threshold photon detector, which shows the practical feasibility of the method. Most importantly, the resulting secret key rate is comparable to the one delivered by an active decoy-state setup with an infinite number of decoy settings. In this article we extend these results, now showing specifically the analysis for other practical scenarios with different light sources and photodetectors. In particular, we consider sources emitting thermal states, phase-randomized WCP, and strong coherent light in combination with several types of photodetectors, like, for instance, threshold photon detectors, photon number resolving detectors, and classical photodetectors. Our analysis includes as well the effect that detection inefficiencies and noise in the form of dark counts shown by current threshold detectors might have on the final secret key rate. Moreover, we provide estimations on the effects that statistical fluctuations due to a finite data size can have in practical implementations.
引用
收藏
页数:15
相关论文
共 45 条
[1]  
Abramowitz M., 1972, Handbook on Mathematical Functions with Formulas, Graphs, and Mathematical Tables
[2]   Fiber-assisted detection with photon number resolution [J].
Achilles, D ;
Silberhorn, C ;
Sliwa, C ;
Banaszek, K ;
Walmsley, IA .
OPTICS LETTERS, 2003, 28 (23) :2387-2389
[3]   Simple and efficient quantum key distribution with parametric down-conversion [J].
Adachi, Yoritoshi ;
Yamamoto, Takashi ;
Koashi, Masato ;
Imoto, Nobuyuki .
PHYSICAL REVIEW LETTERS, 2007, 99 (18)
[4]   Boosting up quantum key distribution by learning statistics of practical single-photon sources [J].
Adachi, Yoritoshi ;
Yamamoto, Takashi ;
Koashi, Masato ;
Imoto, Nobuyuki .
NEW JOURNAL OF PHYSICS, 2009, 11
[5]  
Arfken G.B., 2012, Mathematical Methods for Physicists
[6]  
Bazaraa Mokhtar S, 2008, LINEAR PROGRAMMING N
[7]  
Bennett C. H., 2014, Theoretical computer science, P175, DOI [DOI 10.1016/J.TCS.2014.05.025, 10.1016/j.tcs.2014.05.025]
[8]   Limitations on practical quantum cryptography [J].
Brassard, G ;
Lütkenhaus, N ;
Mor, T ;
Sanders, BC .
PHYSICAL REVIEW LETTERS, 2000, 85 (06) :1330-1333
[9]  
Brassard G., 1994, LECT NOTES COMPUTER, V765, P410, DOI [10.1007/3-540-48285-7_35, DOI 10.1007/3-540-48285-7_35]
[10]   Non-Poissonian statistics from Poissonian light sources with application to passive decoy state quantum key distribution [J].
Curty, Marcos ;
Moroder, Tobias ;
Ma, Xiongfeng ;
Luetkenhaus, Norbert .
OPTICS LETTERS, 2009, 34 (20) :3238-3240