期刊文献+

Practical non-orthogonal decoy state quantum key distribution with heralded single photon source 被引量:4

Practical non-orthogonal decoy state quantum key distribution with heralded single photon source
原文传递
导出
摘要 Recently the performance of the quantum key distribution (QKD) is substantially improved by the decoy state method and the non-orthogonal encoding protocol, separately. In this paper, a practical non-orthogonal decoy state protocol with a heralded single photon source (HSPS) for QKD is presented. The protocol is based on 4 states with different intensities. i.e. one signal state and three decoy states. The signal state is for generating keys; the decoy states are for detecting the eavesdropping and estimating the fraction of single-photon and two-photon pulses. We have discussed three cases of this protocol, i.e. the general case, the optimal case and the special case. Moreover, the final key rate over transmission distance is simulated. For the low dark count of the HSPS and the utilization of the two-photon pulses, our protocol has a higher key rate and a longer transmission distance than any other decoy state protocol. Recently the performance of the quantum key distribution (QKD) is substantially improved by the decoy state method and the non-orthogonal encoding protocol, separately. In this paper, a practical non-orthogonal decoy state protocol with a heralded single photon source (HSPS) for QKD is presented. The protocol is based on 4 states with different intensities. i.e. one signal state and three decoy states. The signal state is for generating keys; the decoy states are for detecting the eavesdropping and estimating the fraction of single-photon and two-photon pulses. We have discussed three cases of this protocol, i.e. the general case, the optimal case and the special case. Moreover, the final key rate over transmission distance is simulated. For the low dark count of the HSPS and the utilization of the two-photon pulses, our protocol has a higher key rate and a longer transmission distance than any other decoy state protocol.
出处 《Chinese Physics B》 SCIE EI CAS CSCD 2008年第4期1178-1183,共6页 中国物理B(英文版)
基金 Project supported by the National Natural Science Foundation of China (Grant No 60578055) the State Key Development Program for Basic Research of China (Grant No 2007CB307001)
关键词 quantum key distribution decoy state non-orthogonal encoding protocol heralded single photon source quantum key distribution, decoy state, non-orthogonal encoding protocol, heralded single photon source
  • 相关文献

参考文献22

  • 1Gisin N, Ribordy G, Tittel W and Zbinden H 2002 Rev. Mod. Phys. 74 145.
  • 2Ekert A K and Huttner B 1996 J. Mod. Opt. 41 2455.
  • 3Deutsch D, Ekert A, Jozsa R, Macchiavello C, Popsescu S and Sanpera A 1996 Phys. Rev. Lett. 77 2818.
  • 4Huttner B, Imoto N, Gisin N and Mor T 1995 Phys. Rev. A 51 1863.
  • 5Lutkenhaus N and Jahma M 2002 New. J. Phys. 4 44.
  • 6Gottesman D, Lo H K, Lutkenhaus N and Preskill J 2004 Quantum Inf. Comput. 4 325.
  • 7Scarani V, Acin A, Ribordy G and Gisin N 2004 Phys. Rev. Lett. 92 057901.
  • 8Zeng G H and Zhu H W 2002 Acta Phys. Sin. 51 0727.
  • 9Zhang Q and Zhang E Y 2002 Acta Phys. Sin. 51 1684.
  • 10Bennett C H and Brassard G 1984 Proceeding of IEEE International Conference on Computers, Systems and Signal Processing (New York: IEEE) p175.

同被引文献29

  • 1S Wiesner. Conjugate coding[J]. SIGACT News, 1983,15(1) : 78 - 88.
  • 2C H Bennett, G Brassard, et al. Quantum cryptography, or unforgeable subway tokens[ A ]. Advances in Cryptography: Proceedings of CRYPTO 82[C] .New York:Plenum Press, 1983. 267- 275.
  • 3C H Bennett, G Brassard. Quantum cryptography and its application to provably secure key expansion, public-key distribution,and coin-tossing[ A]. IEEE International Symposium on Information Theory[C]. St-Jovite: Qebec Press, 1983.91 - 95.
  • 4C H Bennett, G Brassard. Quantum cryptography: public-key distribution and coin tossing[A]. Proceedings of the International Conference on Computers, Systems and Signal Processing [C]. India: Bangalore Press, 1984.175 - 179.
  • 5G S Vemam. Cipher printing telegraph systems for secret wire and radio telegraphic communications[ J]. Journal of the American Institute of Electrical Engineers, 1926,55(1) : 109 - 115.
  • 6A K Ekert. Quantum cryptography based on Bell theorem[ J ]. Physical Review Letters, 1991,67(6) :661 - 663.
  • 7C H Bennett. Quantttrn cryptography using any two nonorthogonal states[J]. Physical Review Letters, 1992, 68 (21) : 3121 - 3124.
  • 8C H Bennett, Brassard G, et al. Quantum cryptography without Bell theorem[ J ]. Physical Review Letters, 1992,68 ( 5 ) : 557 - 559.
  • 9D Bruss. Optimal eavesdropping in quantum cryptography with six states[J]. Physical Review Letters, 1998,81 ( 14):3018 - 3021.
  • 10A Cabello. Quantum key distribution in the Holevo limit[J]. Physical Review Letters, 2000,85 (26) : 5635 - 5638.

引证文献4

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部