Practical high-speed light source for decoy-state quantum key distribution

2014 ◽  
Vol 12 (7) ◽  
pp. 072702-72705 ◽  
Author(s):  
Haibin Du Haibin Du ◽  
Yan Liang Yan Liang ◽  
Shengxiang Zhang Shengxiang Zhang ◽  
Xiuliang Chen Xiuliang Chen ◽  
Lin Zhao Lin Zhao ◽  
...  
2019 ◽  
Vol 34 (04) ◽  
pp. 2050063
Author(s):  
Yefeng He ◽  
Wenping Ma

With heralded pair coherent states (HPCS), orbital angular momentum (OAM) states and pulse position modulation (PPM) technology, a decoy-state measurement-device-independent quantum key distribution (MDI-QKD) protocol is proposed. OAM states and PPM technology are used to realize the coding of the signal states in the HPCS light source. The use of HPCS light source, OAM coding and PPM coding cannot only reduce the error rate but also improve the key generation rate and communication distance. The new MDI-QKD protocol also employs three-intensity decoy states to avoid the attacks against the light source. By calculating the error rate and key generation rate, the performance of the MDI-QKD protocol is analyzed. Numerical simulation shows that the protocol has very low error rate and very high key generation rate. Moreover, the maximum communication distance can reach 455 km.


2011 ◽  
Vol 60 (11) ◽  
pp. 110303
Author(s):  
Jiao Rong-Zhen ◽  
Zhang Chao ◽  
Ma Hai-Qiang

2010 ◽  
Vol 35 (20) ◽  
pp. 3393 ◽  
Author(s):  
Yang Zhang ◽  
Wei Chen ◽  
Shuang Wang ◽  
Zhen-Qiang Yin ◽  
Fang-Xing Xu ◽  
...  

2021 ◽  
Vol 7 (1) ◽  
Author(s):  
Feng-Yu Lu ◽  
Xing Lin ◽  
Shuang Wang ◽  
Guan-Jie Fan-Yuan ◽  
Peng Ye ◽  
...  

AbstractThe decoy-state method substantially improves the performance of quantum key distribution (QKD) and perfectly solves crucial issues caused by multiphoton pulses. In recent years, the decoy-state method has occupied a key position in practicality, and almost all the QKD systems have employed the decoy-state method. However, the imperfections of traditional intensity modulators limit the performance of the decoy-state method and bring side channels. In this work, a special intensity modulator and its accompanying modulation method are designed and experimentally verified for the secure, stable, and high-performance decoy-state QKDs. The experimental result indicates that its stable and adjustable intensities, convenient two-level modulation, inherently high speed, and compact structure is extremely fit for future trends and will help the decoy-state method to be perfectly applied to QKD systems.


Quantum ◽  
2021 ◽  
Vol 5 ◽  
pp. 602
Author(s):  
Víctor Zapatero ◽  
Álvaro Navarrete ◽  
Kiyoshi Tamaki ◽  
Marcos Curty

The decoy-state method in quantum key distribution (QKD) is a popular technique to approximately achieve the performance of ideal single-photon sources by means of simpler and practical laser sources. In high-speed decoy-state QKD systems, however, intensity correlations between succeeding pulses leak information about the users' intensity settings, thus invalidating a key assumption of this approach. Here, we solve this pressing problem by developing a general technique to incorporate arbitrary intensity correlations to the security analysis of decoy-state QKD. This technique only requires to experimentally quantify two main parameters: the correlation range and the maximum relative deviation between the selected and the actually emitted intensities. As a side contribution, we provide a non-standard derivation of the asymptotic secret key rate formula from the non-asymptotic one, in so revealing a necessary condition for the significance of the former.


2013 ◽  
Vol 31 (9) ◽  
pp. 1399-1408 ◽  
Author(s):  
Zhizhong Yan ◽  
Evan Meyer-Scott ◽  
Jean-Philippe Bourgoin ◽  
Brendon L. Higgins ◽  
Nikolay Gigov ◽  
...  

2021 ◽  
Vol 11 (1) ◽  
Author(s):  
Weilong Wang ◽  
Kiyoshi Tamaki ◽  
Marcos Curty

AbstractMeasurement-device-independent quantum key distribution (MDI-QKD) can remove all detection side-channels from quantum communication systems. The security proofs require, however, that certain assumptions on the sources are satisfied. This includes, for instance, the requirement that there is no information leakage from the transmitters of the senders, which unfortunately is very difficult to guarantee in practice. In this paper we relax this unrealistic assumption by presenting a general formalism to prove the security of MDI-QKD with leaky sources. With this formalism, we analyze the finite-key security of two prominent MDI-QKD schemes—a symmetric three-intensity decoy-state MDI-QKD protocol and a four-intensity decoy-state MDI-QKD protocol—and determine their robustness against information leakage from both the intensity modulator and the phase modulator of the transmitters. Our work shows that MDI-QKD is feasible within a reasonable time frame of signal transmission given that the sources are sufficiently isolated. Thus, it provides an essential reference for experimentalists to ensure the security of implementations of MDI-QKD in the presence of information leakage.


2005 ◽  
Author(s):  
Xiao Tang ◽  
Lijun Ma ◽  
Alan Mink ◽  
Anastase Nakassis ◽  
Barry Hershman ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document