Decoy-state quantum key distribution for the heralded pair coherent state photon source with intensity fluctuations

This paper characterizes two important properties of the photon number distribution of the heralded pair coherent state (HPCS) photon source. The formula of secret key generation rates for the decoy-state quantum key distribution with intensity fluctuation source is proved to hold true for the HPCS photon source. By numerical simulations, we show that the three-intensity decoy-state protocols for the HPCS photon source is efficiently getting close to the ideal decoy-state method. Moreover, we find that the HPCS source is more robust against intensity fluctuation than the weak coherent photon (WCP) source, but less stable than the heralded single photon source (HSPS).

[1]  Xiang-Bin Wang A decoy-state protocol for quantum cryptography with 4 intensities of coherent states , 2008 .

[2]  Xiongfeng Ma,et al.  Decoy state quantum key distribution. , 2004, Physical review letters.

[3]  B Kraus,et al.  Lower and upper bounds on the secret-key rate for quantum key distribution protocols using one-way classical communication. , 2004, Physical review letters.

[4]  Zheng-Fu Han,et al.  Erratum: Decoy-state theory for the heralded single-photon source with intensity fluctuations [Phys. Rev. A 79, 062309 (2009)] , 2010 .

[5]  Dong Liu,et al.  Field experiment on a robust hierarchical metropolitan quantum cryptography network , 2009 .

[6]  Multiphoton communication in lossy channels with photon-number entangled states , 2006, quant-ph/0612028.

[7]  G. Guo,et al.  Experimental Decoy Quantum Key Distribution Up To 130KM Fiber , 2007, 0704.2941.

[8]  Takayoshi Kobayashi,et al.  Decoy state quantum key distribution with a photon number resolved heralded single photon source , 2006 .

[9]  M. Koashi Unconditional security of coherent-state quantum key distribution with a strong phase-reference pulse. , 2004, Physical review letters.

[10]  Guihua Zeng,et al.  Realization of error correction and reconciliation of continuous quantum key distribution in detail , 2009, Science in China Series F: Information Sciences.

[11]  Agarwal,et al.  Generation of pair coherent states and squeezing via the competition of four-wave mixing and amplified spontaneous emission. , 1986, Physical review letters.

[12]  G. Guo,et al.  Active phase compensation of quantum key distribution system , 2008 .

[13]  Lo,et al.  Unconditional security of quantum key distribution over arbitrarily long distances , 1999, Science.

[14]  V. Scarani,et al.  Security of two quantum cryptography protocols using the same four qubit states (18 pages) , 2005, quant-ph/0505035.

[15]  Yi Zhao,et al.  Experimental quantum key distribution with decoy states. , 2006, Physical review letters.

[16]  Wang Xiangbin Erratum: Decoy-state protocol for quantum cryptography with four different intensities of coherent light [Phys. Rev. A 72, 012322 (2005)] , 2005 .

[17]  Shor,et al.  Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.

[18]  P. A. Hiskett,et al.  Experimental decoy state quantum key distribution , 2007, 2007 Quantum Electronics and Laser Science Conference.

[19]  Jian-Wei Pan,et al.  General theory of decoy-state quantum cryptography with source errors , 2006, quant-ph/0612121.

[20]  Zheng-Fu Han,et al.  Decoy-state theory for the heralded single-photon source with intensity fluctuations , 2009 .

[21]  ChengZu Li Real applications of quantum communications in China , 2009 .

[22]  Jian-Wei Pan,et al.  Decoy-state quantum key distribution with both source errors and statistical fluctuations , 2009, 0902.4660.

[23]  F. Toscano,et al.  Quantum metrology at the Heisenberg limit with ion trap motional compass states , 2006, quant-ph/0608082.

[24]  Won-Young Hwang Quantum key distribution with high loss: toward global secure communication. , 2003, Physical review letters.

[25]  John Preskill,et al.  Security of quantum key distribution with imperfect devices , 2002, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..

[26]  Nicolas Gisin,et al.  Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations. , 2004, Physical review letters.

[27]  Kai Chen,et al.  Field test of a practical secure communication network with decoy-state quantum cryptography. , 2008, Optics express.

[28]  Guang-Can Guo,et al.  A universal coherent source for quantum key distribution , 2009 .

[29]  Peilin Hong,et al.  Multiple stochastic paths scheme on partially-trusted relay quantum key distribution network , 2009, Science in China Series F: Information Sciences.

[30]  Xiang‐Bin Wang,et al.  Beating the PNS attack in practical quantum cryptography , 2004 .

[31]  Zheng-Fu Han,et al.  Decoy state quantum key distribution with modified coherent state , 2007, 0704.3833.

[32]  H. Lo,et al.  Performance of two quantum-key-distribution protocols , 2006 .

[33]  Guo Guangcan,et al.  Experimental Decoy State Quantum Key Distribution Over 120 km Fibre , 2008 .

[34]  Valerio Scarani,et al.  Finite-key analysis for practical implementations of quantum key distribution , 2008, 0811.2628.