Improved secure bounds for passive decoy state quantum key distribution system

被引:0
作者
Fan Liu
Chun Zhou
Yang Wang
Yahui Gan
Musheng Jiang
Wansu Bao
机构
[1] Henan Key Laboratory of Quantum Information and Cryptography,Synergetic Innovation Centre of Quantum Information and Quantum Physics
[2] SSF IEU,undefined
[3] University of Science and Technology of China,undefined
来源
Optical and Quantum Electronics | 2020年 / 52卷
关键词
Quantum key distribution; Passive decoy-state; Chernoff bound; Finite-size;
D O I
暂无
中图分类号
学科分类号
摘要
The decoy-state method was proposed as an effective way to resist photon-number splitting attack in quantum key distribution (QKD) system. However, due to the limitation of computing power, the final key rate of the QKD system is affected by statistical fluctuation. Until now, the key rate of active decoy-state method under statistical fluctuations has been rigorously analysed and improved by applying the improved Chernoff bound. In this paper, the improved Chernoff bound method is applied in the passive decoy-state method and an improved bound for estimating the final key rate is obtained. The simulation results show that the maximum secure transmission distance by our method can reach 205 km under standard optical fiber, which is very close to the asymptotic limit of 212 km. With a number of pulses up to 1013, our method can reach the highest final key rates among existing results, which can be considered as the best choice for QKD implementations with passive mudulation.
引用
收藏
相关论文
共 73 条
[1]  
Acín A(2007)Device-independent security of quantum cryptography against collective attacks Phys. Rev. Lett. 98 230501-2208
[2]  
Brunner N(2007)Simple and efficient quantum key distribution with parametric down-conversion Phys. Rev. Lett. 99 180503-398
[3]  
Gisin N(2017)Goos-Hänchen shifts due to spin-orbit coupling in the carbon nanotube quantum dot nanostructures Appl. Opt. 56 2201-360
[4]  
Massar S(2014)Phase and thickness control of optical bistability and multistability in a defect slab with a single layer of graphene Laser Phys. Lett. 13 015201-455
[5]  
Pironio S(2014)Subluminal and superluminal pulse propagation via spin coherence in a defect dielectric medium Opt. Commun. 315 394-undefined
[6]  
Scarani V(2012)One-sided device-independent quantum key distribution: security, feasibility, and the connection with steering Phys. Rev. A 85 010301-undefined
[7]  
Adachi Y(2004)Security of quantum key distribution with imperfect devices Quantum Inf. Comput. 4 325-undefined
[8]  
Yamamoto T(2012)Concise and tight security analysis of the Bennett-Brassard 1984 protocol with finite key lengths New J. Phys. 14 093014-undefined
[9]  
Koashi M(2003)Quantum key distribution with high loss: toward global secure communication Phys. Rev. Lett. 91 057901-undefined
[10]  
Imoto N(2005)Robustness of differential-phase-shift quantum key distribution against photon-number-splitting attack Phys. Rev. A 71 042305-undefined