A new scheme on improving the performance of the quantum key distribution with two-intensity weak coherent light

In this paper, we propose a new scheme on implementing the quantum key distribution with two-intensity weak coherent light and compare its performance with other existing methods. Through numerical simulations, we demonstrate that our new scheme can exceed almost all other existing decoy-state methods, e.g., the standard three-intensity decoy-state method and the usual passive decoy-state method, both in the transmission distance and in the final key generation rate, approaching very closely to the ideal case of using an infinite number of decoy states. Besides, we also consider the finite-size key effect. We demonstrate that under current experimental conditions, even when taking statistical fluctuation into account, a quite high key generation rate can still be obtained at very long transmission distance by applying our new scheme.

[1]  Shor,et al.  Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.

[2]  V. Scarani,et al.  Device-independent security of quantum cryptography against collective attacks. , 2007, Physical review letters.

[3]  Qin Wang,et al.  Efficient implementation of the decoy-state measurement-device-independent quantum key distribution with heralded single-photon sources , 2013, 1305.6480.

[4]  Xiang‐Bin Wang,et al.  Tightened estimation can improve the key rate of measurement-device-independent quantum key distribution by more than 100% , 2014 .

[5]  M. Curty,et al.  Measurement-device-independent quantum key distribution. , 2011, Physical review letters.

[6]  J. Skaar,et al.  Hacking commercial quantum cryptography systems by tailored bright illumination , 2010, 1008.4593.

[7]  Nicolas Gisin,et al.  Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations. , 2004, Physical review letters.

[8]  2004b, A decoy-state protocol for quantum cryptography with 4 intensities of coherent light, Los Alamos e-print archive: quant-ph/0411047 , .

[9]  N. Lütkenhaus Security against individual attacks for realistic quantum key distribution , 2000 .

[10]  Lo,et al.  Unconditional security of quantum key distribution over arbitrarily long distances , 1999, Science.

[11]  Yi Zhao,et al.  Experimental quantum key distribution with decoy states. , 2006, Physical review letters.

[12]  Hoi-Kwong Lo,et al.  Phase-Remapping Attack in Practical Quantum Key Distribution Systems , 2006, ArXiv.

[13]  V. Scarani,et al.  One-sided device-independent quantum key distribution: Security, feasibility, and the connection with steering , 2011, 1109.1435.

[14]  Jian-Wei Pan,et al.  Measurement-device-independent quantum key distribution over 200 km. , 2014, Physical review letters.

[15]  C. Silberhorn,et al.  Quantum key distribution with passive decoy state selection , 2007 .

[16]  Gerd Leuchs,et al.  Device calibration impacts security of quantum key distribution. , 2011, Physical review letters.

[17]  Dominic Mayers,et al.  Unconditional security in quantum cryptography , 1998, JACM.

[18]  Wei Chen,et al.  Phase-encoded measurement-device-independent quantum key distribution with practical spontaneous-parametric-down-conversion sources , 2013 .

[19]  H. Lo,et al.  Phase encoding schemes for measurement-device-independent quantum key distribution with basis-dependent flaw , 2011, 1111.3413.

[20]  Xiang‐Bin Wang,et al.  Beating the PNS attack in practical quantum cryptography , 2004 .

[21]  T. Moroder,et al.  Passive decoy-state quantum key distribution with practical light sources , 2009, 0911.2815.

[22]  H. Lo,et al.  Practical decoy state for quantum key distribution (15 pages) , 2005 .

[23]  T. Kobayashi,et al.  Quantum key distribution with a heralded single photon source , 2007, International Quantum Electronics Conference, 2005..

[24]  H. Lo,et al.  Practical Decoy State for Quantum Key Distribution , 2005, quant-ph/0503005.

[25]  Gilles Brassard,et al.  Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..

[26]  Guang-Can Guo,et al.  Limitation of decoy-state Scarani-Acin-Ribordy-Gisin quantum-key-distribution protocols with a heralded single-photon source , 2007 .

[27]  Xiongfeng Ma,et al.  ar X iv : q ua ntp h / 05 12 08 0 v 2 1 1 A pr 2 00 6 TIMESHIFT ATTACK IN PRACTICAL QUANTUM , 2005 .

[28]  Sanders,et al.  Limitations on practical quantum cryptography , 2000, Physical review letters.

[29]  Stefano Pirandola,et al.  Side-channel-free quantum key distribution. , 2011, Physical review letters.

[30]  Won-Young Hwang Quantum key distribution with high loss: toward global secure communication. , 2003, Physical review letters.

[31]  Xiongfeng Ma,et al.  Decoy state quantum key distribution. , 2004, Physical review letters.

[32]  N. Lutkenhaus,et al.  Quantum key distribution with realistic states: photon-number statistics in the photon-number splitting attack , 2001, quant-ph/0112147.