An enhanced proposal on decoy-state measurement device-independent quantum key distribution

被引:0
作者
Qin Wang
Chun-Hui Zhang
Shunlong Luo
Guang-Can Guo
机构
[1] Nanjing University of Posts and Telecommunications,Institute of Signal Processing and Transmission
[2] Nanjing University of Posts and Telecommunications Ministry of Education,Key Lab of Broadband Wireless Communication and Sensor Network Technology
[3] Chinese Academy of Sciences,Academy of Mathematics and Systems Science
[4] University of Science and Technology of China,Key Laboratory of Quantum Information
来源
Quantum Information Processing | 2016年 / 15卷
关键词
Decoy-state; Measurement device-independent; Quantum key distribution; Heralded single-photon source;
D O I
暂无
中图分类号
学科分类号
摘要
By employing pulses involving three-intensity, we propose a scheme for the measurement device-independent quantum key distribution with heralded single-photon sources. We make a comparative study of this scheme with the standard three-intensity decoy-state scheme using weak coherent sources or heralded single-photon sources. The advantage of this scheme is illustrated through numerical simulations: It can approach very closely the asymptotic case of using an infinite number of decoy-states and exhibits excellent behavior in both the secure transmission distance and the final key generation rate.
引用
收藏
页码:3785 / 3797
页数:12
相关论文
共 110 条
[1]  
Gisin N(2002)Quantum cryptography Rev. Mod. Phys. 74 145195-undefined
[2]  
Ribordy G(2007)Quantum communication Nat. Photonics 1 165-undefined
[3]  
Tittel W(2009)The security of practical quantum key distribution Rev. Mod. Phys. 81 1301-undefined
[4]  
Zbinden H(1995)Quantum cryptography with coherent states Phys. Rev. A 51 1863-undefined
[5]  
Gisin N(1996)Quantum amplifiers, quantum duplicators and quantum cryptography Quantum Semiclass. Opt. 8 939-undefined
[6]  
Thew R(2000)Limitations on practical quantum cryptography Phys. Rev. Lett. 85 1330-undefined
[7]  
Scarani V(2002)Quantum key distribution with realistic states: photon-number statistics in the photon-number splitting attack New J. Phys. 4 44-undefined
[8]  
Huttner B(2000)Security against individual attacks for realistic quantum key distribution Phys. Rev. A 61 052304-undefined
[9]  
Imoto N(2007)Phase-remapping attack in practical quantum-key-distribution systems Phys. Rev. A 75 032314-undefined
[10]  
Gisin N(2007)Time-shift attack in practical quantum cryptosystems Quantum Inf. Comput. 7 73-undefined