A universal coherent source for quantum key distribution

We propose a concept of universal coherent source for quantum key distribution. The weak coherent pulse (WCP) and heralded single photon source (HSPS) are the most common photon sources for state-of-art quantum key distribution (QKD). However, there exists a prominent crossover between the maximal secure distance and the secure key generating rate in short and middle distance if one applies these two sources in a practical decoy state quantum key distribution. It is shown that by combining the heralded pair coherent state (HPCS) photon source and the practical decoy state method together, one can not only strengthen the maximal secure transmission distance, but also improve key generating rate at short and medium distance. Moreover, the advancement in key generating is not confined in the particular protocol utilized and can be easily checked for both BB84 and SARG protocol. Finally, we clearly demonstrate how the HPCS-based decoy method works effectively and feasibly by proposing an efficient HPCS-based “1 signal+2 decoy” state method.

[1]  Joseph M Renes,et al.  Structured codes improve the Bennett-Brassard-84 quantum key rate. , 2008, Physical review letters.

[2]  Leonardo Neves,et al.  Generation of entangled states of qudits using twin photons. , 2004, Physical review letters.

[3]  John Preskill,et al.  Security of quantum key distribution with imperfect devices , 2002, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..

[4]  Wolfgang Dür,et al.  Quantum Repeaters: The Role of Imperfect Local Operations in Quantum Communication , 1998 .

[5]  Hai Xu,et al.  Detector dead-time effects and paralyzability in high-speed quantum key distribution , 2007 .

[6]  Gilles Brassard,et al.  Quantum Cryptography , 2005, Encyclopedia of Cryptography and Security.

[7]  Zheng-Fu Han,et al.  Decoy state quantum key distribution with modified coherent state , 2007, 0704.3833.

[8]  Z. Y. Ou,et al.  Security improvement by using a modified coherent state for quantum cryptography , 2005 .

[9]  Agarwal,et al.  Generation of pair coherent states and squeezing via the competition of four-wave mixing and amplified spontaneous emission. , 1986, Physical review letters.

[10]  H. Lo,et al.  Unconditionally secure key distillation from multiphotons , 2004, quant-ph/0412035.

[11]  H. Lo,et al.  Practical decoy state for quantum key distribution (15 pages) , 2005 .

[12]  H. Lo,et al.  Performance of two quantum-key-distribution protocols , 2006 .

[13]  S P Walborn,et al.  Quantum key distribution with higher-order alphabets using spatially encoded qudits. , 2006, Physical review letters.

[14]  Guang-Can Guo,et al.  Limitation of decoy-state Scarani-Acin-Ribordy-Gisin quantum-key-distribution protocols with a heralded single-photon source , 2007 .

[15]  A. R. Dixon,et al.  Gigahertz quantum key distribution with InGaAs avalanche photodiodes , 2008 .

[16]  Guang-Can Guo,et al.  Generation of pair coherent state using weak cross-Kerr media , 2008 .

[17]  Yi Zhao,et al.  Experimental quantum key distribution with decoy states. , 2006, Physical review letters.

[18]  Xiang‐Bin Wang,et al.  Beating the PNS attack in practical quantum cryptography , 2004 .

[19]  Takayoshi Kobayashi,et al.  Decoy state quantum key distribution with a photon number resolved heralded single photon source , 2006 .

[20]  Ian A Walmsley,et al.  Secure quantum key distribution using continuous variables of single photons. , 2007, Physical review letters.

[21]  Wang Xiangbin Erratum: Decoy-state protocol for quantum cryptography with four different intensities of coherent light [Phys. Rev. A 72, 012322 (2005)] , 2005 .

[22]  Tao Zhang,et al.  Experimental decoy-state quantum key distribution with a sub-poissionian heralded single-photon source. , 2008, Physical review letters.

[23]  Shor,et al.  Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.

[24]  Z. Yuan,et al.  Quantum key distribution over 122 km of standard telecom fiber , 2004, quant-ph/0412171.

[25]  V. Lakshminarayanan,et al.  Conditional preparation of states containing a definite number of photons , 2007, 0709.4644.

[26]  Qing-yu Cai,et al.  Photon-number-resolving decoy-state quantum key distribution , 2006 .

[27]  Photon statistics measurement by use of single photon detection , 2004 .

[28]  G. Guo,et al.  Active phase compensation of quantum key distribution system , 2008 .

[29]  Lo,et al.  Unconditional security of quantum key distribution over arbitrarily long distances , 1999, Science.

[30]  J. M. Ettinger,et al.  Enhancing practical security of quantum key distribution with a few decoy states , 2005, quant-ph/0503002.

[31]  C. Elliott Building the quantum network* , 2002 .

[32]  Xiongfeng Ma Security of Quantum Key Distribution with Realistic Devices , 2005, quant-ph/0503057.

[33]  H. Lo,et al.  Practical Decoy State for Quantum Key Distribution , 2005, quant-ph/0503005.

[34]  Sanders,et al.  Limitations on practical quantum cryptography , 2000, Physical review letters.

[35]  N. Lütkenhaus Security against individual attacks for realistic quantum key distribution , 2000 .

[36]  Multiphoton communication in lossy channels with photon-number entangled states , 2006, quant-ph/0612028.

[37]  Xiongfeng Ma,et al.  Decoy state quantum key distribution. , 2004, Physical review letters.

[38]  Won-Young Hwang Quantum key distribution with high loss: toward global secure communication. , 2003, Physical review letters.