Finite-key analysis based on neural network of practical wavelength division multiplexed decoy-state quantum key distribution

2021 ◽  
Author(s):  
Jiahao LI ◽  
Lei Shi ◽  
Junhui Wang ◽  
Tianxiu Li ◽  
Yang Xue
2021 ◽  
pp. 2150479
Author(s):  
Jia-Hao Li ◽  
Lei Shi ◽  
Tian-Xiu Li ◽  
Yang Xue ◽  
Zhi-Yun Zhang ◽  
...  

The integration of quantum key distribution (QKD) devices with the existing optical fiber networks is of great significance in reducing the deployment costs and saving fiber resources. Wavelength division multiplexing (WDM) is expected to be a desirable approach to fulfill this ultimate task. In this paper, we analyze the dominant noises in WDM-based QKD system and optimize the key parameters based on a modified model with 200 GHz channel spacing. Then, an appropriate decoy-state method is adopted to estimate the system performance considering statistical fluctuations. Finally, a three-layer artificial neural network is used to train and predict the optimal mean photon numbers within different situations. Our work provides a useful method for the parameters optimization of WDM-QKD system and accelerates the practical development of QKD that coexists with the current backbone fiber infrastructure.


2021 ◽  
Vol 11 (1) ◽  
Author(s):  
Weilong Wang ◽  
Kiyoshi Tamaki ◽  
Marcos Curty

AbstractMeasurement-device-independent quantum key distribution (MDI-QKD) can remove all detection side-channels from quantum communication systems. The security proofs require, however, that certain assumptions on the sources are satisfied. This includes, for instance, the requirement that there is no information leakage from the transmitters of the senders, which unfortunately is very difficult to guarantee in practice. In this paper we relax this unrealistic assumption by presenting a general formalism to prove the security of MDI-QKD with leaky sources. With this formalism, we analyze the finite-key security of two prominent MDI-QKD schemes—a symmetric three-intensity decoy-state MDI-QKD protocol and a four-intensity decoy-state MDI-QKD protocol—and determine their robustness against information leakage from both the intensity modulator and the phase modulator of the transmitters. Our work shows that MDI-QKD is feasible within a reasonable time frame of signal transmission given that the sources are sufficiently isolated. Thus, it provides an essential reference for experimentalists to ensure the security of implementations of MDI-QKD in the presence of information leakage.


2009 ◽  
Vol 34 (20) ◽  
pp. 3238 ◽  
Author(s):  
Marcos Curty ◽  
Tobias Moroder ◽  
Xiongfeng Ma ◽  
Norbert Lütkenhaus

2005 ◽  
Vol 03 (supp01) ◽  
pp. 143-143 ◽  
Author(s):  
HOI-KWONG LO

Quantum key distribution (QKD) allows two parties to communicate in absolute security based on the fundamental laws of physics. Up till now, it is widely believed that unconditionally secure QKD based on standard Bennett-Brassard (BB84) protocol is limited in both key generation rate and distance because of imperfect devices. Here, we solve these two problems directly by presenting new protocols that are feasible with only current technology. Surprisingly, our new protocols can make fiber-based QKD unconditionally secure at distances over 100km (for some experiments, such as GYS) and increase the key generation rate from O(η2) in prior art to O(η) where η is the overall transmittance. Our method is to develop the decoy state idea (first proposed by W.-Y. Hwang in "Quantum Key Distribution with High Loss: Toward Global Secure Communication", Phys. Rev. Lett. 91, 057901 (2003)) and consider simple extensions of the BB84 protocol. This part of work is published in "Decoy State Quantum Key Distribution", . We present a general theory of the decoy state protocol and propose a decoy method based on only one signal state and two decoy states. We perform optimization on the choice of intensities of the signal state and the two decoy states. Our result shows that a decoy state protocol with only two types of decoy states—a vacuum and a weak decoy state—asymptotically approaches the theoretical limit of the most general type of decoy state protocols (with an infinite number of decoy states). We also present a one-decoy-state protocol as a special case of Vacuum+Weak decoy method. Moreover, we provide estimations on the effects of statistical fluctuations and suggest that, even for long distance (larger than 100km) QKD, our two-decoy-state protocol can be implemented with only a few hours of experimental data. In conclusion, decoy state quantum key distribution is highly practical. This part of work is published in "Practical Decoy State for Quantum Key Distribution", . We also have done the first experimental demonstration of decoy state quantum key distribution, over 15km of Telecom fibers. This part of work is published in "Experimental Decoy State Quantum Key Distribution Over 15km", .


Sign in / Sign up

Export Citation Format

Share Document