×

A universal coherent source for quantum key distribution. (English) Zbl 1184.81044

Summary: We propose a concept of universal coherent source for quantum key distribution. The weak coherent pulse (WCP) and heralded single photon source (HSPS) are the most common photon sources for state-of-art quantum key distribution (QKD). However, there exists a prominent crossover between the maximal secure distance and the secure key generating rate in short and middle distance if one applies these two sources in a practical decoy state quantum key distribution. It is shown that by combining the heralded pair coherent state (HPCS) photon source and the practical decoy state method together, one can not only strengthen the maximal secure transmission distance, but also improve key generating rate at short and medium distance. Moreover, the advancement in key generating is not confined in the particular protocol utilized and can be easily checked for both BB84 and SARG protocol. Finally, we clearly demonstrate how the HPCS-based decoy method works effectively and feasibly by proposing an efficient HPCS-based “1 signal+2 decoy” state method.

MSC:

81P94 Quantum cryptography (quantum-theoretic aspects)

References:

[1] Bennett C H, Brassard G. Quantum cryptography: Publish-key distribution and coin tossing. In: Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing, Bangalore, India, 1984. 175–179
[2] Gisin N, Ribordy G, Tittel W, et al. Quantum cryptography. Rev Mod Phys, 2002, 74: 145–195 · Zbl 1371.81006 · doi:10.1103/RevModPhys.74.145
[3] Hwang W Y. Quantum key distribution with high loss: Toward global secure communication. Phys Rev Lett, 2003, 91: 057901
[4] Wang X B. Beating the photon-number-splitting attack in practical quantum cryptography. Phys Rev Lett, 2005, 94: 230503
[5] Lo H K. Decoy state quantum key distribution. Phys Rev Lett, 2005, 94: 230504
[6] Fung C H F, Tamaki K, Lo H K. Performance of two quantum-key-distribution protocols. Phys Rev A, 2006, 73: 012337
[7] Ma X F, Qi B, Zhao Y, et al. Practical decoy state for quantum key distribution. Phys Rev A, 2005, 72: 012326
[8] Harrington J W, Ettinger J M, Hughes R J, et al. Enhancing practical security of quantum key distribution with a few decoy states. arXiv: quant-ph/0503002
[9] Cai Q Y, Tan T G. Photon-number-resolving decoy-state quantum key distribution. Phys Rev A, 2006, 73: 032305
[10] Smith G, Renes J M, Smolin J A. Structured codes improve the Bennett-Brassard-84 quantum key rate. Phys Rev Lett, 2008, 100: 170502
[11] Walborn S P, Lemelle D S, Almeida M P, et al. Quantum key distribution with higher-order alphabets using spatially encoded qudits. Phys Rev Lett, 2006, 96: 090501
[12] Zhang L J, Silberhorn C, Walmsley I A. Secure quantum key distribution using continuous variables of single photons. Phys Rev Lett, 2008, 100: 110504
[13] Neves L, Lima G, Aguirre Gómez J G, et al. Generation of entangled states of qudits using twin photons. Phys Rev Lett, 2005, 94: 100501
[14] Lütkenhaus N. Security against individual attacks for realistic quantum key distribution. Phys Rev A, 2000, 61: 052304
[15] Horikiri T, Kobayashi T. Decoy state quantum key distribution with a photon number resolved heralded single photon source. Phys Rev A, 2006, 73: 032331
[16] Usenko V C, Paris Matteo G A. Multiphoton communication in lossy channels with photon-number entangled States. Phys Rev A, 2007, 75: 043812
[17] Lu Y J, Zhu L B, Ou Z Y, et al. Security improvement by using a modified coherent state for quantum cryptography. Phys Rev A, 2005, 71: 032315
[18] Yin Z Q, Han Z F, Sun F W, et al. Decoy state quantum key distribution with modified coherent state. Phys Rev A, 2007, 76: 014304
[19] Briegel H, Dür W, Cirac J I, et al. Quantum repeaters: The role of imperfect local operations in quantum communication. Phys Rev Lett, 1998, 81: 5932–5935 · doi:10.1103/PhysRevLett.81.5932
[20] Elliott C. Building the quantum network. New J Phys, 2002, 4: 46.1 · doi:10.1088/1367-2630/4/1/346
[21] Chen W, Han Z F, Mo X F, et al. Active phase compensation of quantum key distribution system. Chinese Sci Bull, 2008, 53: 1310–1314 · doi:10.1007/s11434-008-0023-0
[22] Yuan Z L, Dixon A R, Dynes J F, et al. Gigahertz quantum key distribution with InGaAs avalanche photodiodes. Appl Phys Lett, 2008, 92: 201104 · Zbl 1191.81107
[23] Rogers D J, Bienfang J C, Nakassis A, et al. Detector dead-time effects and paralyzability in high-speed quantum key distribution. arXiv: 0706.1449
[24] Xiao L T, Jiang Y Q, Zhao Y T, et al. Photon statistics measurement by use of single photon detection. Chinese Sci Bull, 2004, 49: 875–878
[25] Zhang L B, Zhong Y Y, Kang L, et al. Near-infrared-wavelength superconducting single-photo detectors. Chinese Sci Bull, 2008, 53: 2668–2670
[26] Gottesman D, Lo H K, Lütkenhaus N, et al. Security of quantum key distribution with imperfect devices. Quant Inform Comput, 2004, 4: 325 · Zbl 1213.81076
[27] Zhang S L, Zou X B, Li K, et al. Limitation of decoy-state Scarani-Acin-Ribordy-Gisin quantum-key-distribution protocols with a heralded single-photon source. Phys Rev A, 2007, 76: 044304
[28] Wang Q, Chen W, Xavier G, et al. Experimental decoy-state quantum key distribution with a sub-possionian heralded single-photon source. Phys Rev Lett, 2008, 100: 090501
[29] Lo H K, Chau H F. Unconditional security of quantum key distrubution over arbitrarily long distances. Science, 1999, 283: 2050–2056 · doi:10.1126/science.283.5410.2050
[30] Shor P W, Preskill J. Simple proof of security of the BB84 quantum key distribution protocol. Phys Rev Lett, 2000, 85: 441–444 · doi:10.1103/PhysRevLett.85.441
[31] Tamaki K, Lo H K. Unconditionally secure key distillation from multiphotons. Phys Rev A, 2006, 73: 010302
[32] Zhao Y, Qi B, Ma X F, et al. Experimental quantum key distribution with decoy states. Phys Rev Lett, 2006, 96: 070502
[33] Brassard G, Lütkenhaus N, Mor T, et al. Limitations on practical quantum cryptography. Phys Rev Lett, 2000, 85: 1330–1333 · doi:10.1103/PhysRevLett.85.1330
[34] Ma X F. Security of quantum key distribution with realistic devices. arxiv: quant-ph/0503057
[35] Agarwal G S. Generation of pair coherent states and squeezing via the competition of four-wave mixing and amplified spontaneous emission. Phys Rev Lett, 1986, 57: 827–830 · doi:10.1103/PhysRevLett.57.827
[36] Dong Y L, Zou X B, Guo G C. Generation of pair coherent state using weak cross-Kerr media. Phys Lett A, 2008, 372: 5677–5680 · Zbl 1223.81065 · doi:10.1016/j.physleta.2008.07.008
[37] Gurin O, Usenko V C, Usenko C V. Photonnumber entangled states generation model with stimulated parametric down conversion. arxiv: 0807.1322
[38] O’sullivan M N, Chan K W C, Lakshminarayanan V, et al. Conditional preparation of states containing a definite number of photons. Phys Rev A, 2008, 77: 023804
[39] Gobby C, Yuan Z L, Shields A J. Quantum key distribution over 122 km of standard telecom. Appl Phys Lett, 2004, 84: 3762–3674 · doi:10.1063/1.1738173
[40] Wang X B. Decoy-state protocol for quantum cryptography with four different intensities of coherent light. Phys Rev A, 2005, 72: 012322
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. In some cases that data have been complemented/enhanced by data from zbMATH Open. This attempts to reflect the references listed in the original paper as accurately as possible without claiming completeness or a perfect matching.