Device Independent Key Generation Using Decoy State

Author(s):  
Supriyo Banerjee ◽  
Biswajit Maiti ◽  
Banani Saha
Keyword(s):  
2005 ◽  
Vol 03 (supp01) ◽  
pp. 143-143 ◽  
Author(s):  
HOI-KWONG LO

Quantum key distribution (QKD) allows two parties to communicate in absolute security based on the fundamental laws of physics. Up till now, it is widely believed that unconditionally secure QKD based on standard Bennett-Brassard (BB84) protocol is limited in both key generation rate and distance because of imperfect devices. Here, we solve these two problems directly by presenting new protocols that are feasible with only current technology. Surprisingly, our new protocols can make fiber-based QKD unconditionally secure at distances over 100km (for some experiments, such as GYS) and increase the key generation rate from O(η2) in prior art to O(η) where η is the overall transmittance. Our method is to develop the decoy state idea (first proposed by W.-Y. Hwang in "Quantum Key Distribution with High Loss: Toward Global Secure Communication", Phys. Rev. Lett. 91, 057901 (2003)) and consider simple extensions of the BB84 protocol. This part of work is published in "Decoy State Quantum Key Distribution", . We present a general theory of the decoy state protocol and propose a decoy method based on only one signal state and two decoy states. We perform optimization on the choice of intensities of the signal state and the two decoy states. Our result shows that a decoy state protocol with only two types of decoy states—a vacuum and a weak decoy state—asymptotically approaches the theoretical limit of the most general type of decoy state protocols (with an infinite number of decoy states). We also present a one-decoy-state protocol as a special case of Vacuum+Weak decoy method. Moreover, we provide estimations on the effects of statistical fluctuations and suggest that, even for long distance (larger than 100km) QKD, our two-decoy-state protocol can be implemented with only a few hours of experimental data. In conclusion, decoy state quantum key distribution is highly practical. This part of work is published in "Practical Decoy State for Quantum Key Distribution", . We also have done the first experimental demonstration of decoy state quantum key distribution, over 15km of Telecom fibers. This part of work is published in "Experimental Decoy State Quantum Key Distribution Over 15km", .


2019 ◽  
Vol 34 (04) ◽  
pp. 2050063
Author(s):  
Yefeng He ◽  
Wenping Ma

With heralded pair coherent states (HPCS), orbital angular momentum (OAM) states and pulse position modulation (PPM) technology, a decoy-state measurement-device-independent quantum key distribution (MDI-QKD) protocol is proposed. OAM states and PPM technology are used to realize the coding of the signal states in the HPCS light source. The use of HPCS light source, OAM coding and PPM coding cannot only reduce the error rate but also improve the key generation rate and communication distance. The new MDI-QKD protocol also employs three-intensity decoy states to avoid the attacks against the light source. By calculating the error rate and key generation rate, the performance of the MDI-QKD protocol is analyzed. Numerical simulation shows that the protocol has very low error rate and very high key generation rate. Moreover, the maximum communication distance can reach 455 km.


Author(s):  
Sellami Ali

We have presented a method to estimate parameters of the decoy state protocol based on one decoy state protocol for both BB84 and SARG04. This method can give different lower bound of the fraction of single-photon counts (y1), the fraction of two-photon counts (y2), the upper bound QBER of single-photon pulses (e1), the upper bound QBER of two-photon pulses (e2), and the lower bound of key generation rate for both BB84 and SARG04. The effects of statistical fluctuations on some parameters of our QKD system have been presented. We have also performed the optimization on the choice of intensities and percentages of signal state and decoy states which give out the maximum distance and the optimization of the key generation rate. The numerical simulation has shown that the fiber based QKD and free space QKD systems using the proposed method for BB84 are able to achieve both a higher secret key rate and greater secure distance than that of SARG04. Also, it is shown that bidirectional ground to satellite and inter-satellite communications are possible with our protocol. The experiment of decoy state QKD has been demonstrated using ID-3000 commercial QKD system based on a standard ‘Plug & Play’ set-up. One decoy state QKD has been implemented for both BB84 and SARG04 over different transmission distance of standard telecom fiber.


2010 ◽  
Vol 10 (2) ◽  
pp. 81-86
Author(s):  
Sellami Ali

Experimental weak + vacuum protocol has been demonstrated using commercial QKD system based on a standard bi-directional ‘Plug & Play’ set-up. By making simple modifications to a commercial quantum key distribution system, decoy state QKD allows us to achieve much better performance than QKD system without decoy state in terms of key generation rate and distance. We demonstrate an unconditionally secure key rate of 6.2931 x 10-4per pulse for a 25 km fiber length.


2021 ◽  
Vol 2086 (1) ◽  
pp. 012141
Author(s):  
A Gavrilovich ◽  
D Sych ◽  
Y Kurochkin

Abstract Passive generation is a sophisticated way of state preparation in quantum key distribution (QKD) systems which is designed to exploit some internal physical process as a source of randomness. It can be profitable in a wide range of scenarios. However, the original analysis of the passive scheme implies an ideal interference which is almost impossible to assure in practice, therefore utilizing such method potentially compromises the security of the system. Here we develop a general technique to estimate decoy-state parameters for a passive protocol with an arbitrary experimental distribution of intensity. We compare this analysis with the original method and show that the proposed technique can provide higher key generation rates.


Author(s):  
Yasuhiko IKEMATSU ◽  
Dung Hoang DUONG ◽  
Albrecht PETZOLDT ◽  
Tsuyoshi TAKAGI

Sign in / Sign up

Export Citation Format

Share Document