Simulation and Implementation of Decoy State Quantum Key Distribution over 60km Telecom Fiber

Decoy state quantum key distribution (QKD) has been proposed as a novel approach to improve dramatically both the security and the performance of practical QKD set-ups. Recently, many theoretical efforts have been made on this topic and have theoretically predicted the high performance of decoy method. However, the gap between theory and experiment remains open. In this paper, we report the first experiments on decoy state QKD, thus bridging the gap. Two protocols of decoy state QKD are implemented: one-decoy protocol over 15 km of standard telecom fiber, and weak+vacuum protocol over 60 km of standard telecom fiber. We implemented the decoy state method on a modified commercial QKD system. The modification we made is simply adding commercial acousto-optic modulator (AOM) on the QKD system. The AOM is used to modulate the intensity of each signal individually, thus implementing the decoy state method. As an important part of implementation, numerical simulation of our set-up is also performed. The simulation shows that standard security proofs give a zero key generation rate at the distance we perform decoy state QKD (both 15 km and 60 km). Therefore decoy state QKD is necessary for long distance secure communication. Our implementation shows explicitly the power and feasibility of decoy method, and brings it to our real-life

[1]  Shor,et al.  Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.

[2]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[3]  A. D. Boozer,et al.  Deterministic Generation of Single Photons from One Atom Trapped in a Cavity , 2004, Science.

[4]  Artur Ekert,et al.  Quantum Cryptography with Interferometric Quantum Entanglement , 1994 .

[5]  Z. Yuan,et al.  Quantum key distribution over 122 km of standard telecom fiber , 2004, quant-ph/0412171.

[6]  Xiongfeng Ma,et al.  Decoy state quantum key distribution. , 2004, Physical review letters.

[7]  Andrew G. Glen,et al.  APPL , 2001 .

[8]  Michael Pepper,et al.  Electrically Driven Single-Photon Source , 2001, Science.

[9]  H. Lo,et al.  Practical Decoy State for Quantum Key Distribution , 2005, quant-ph/0503005.

[10]  Xiang‐Bin Wang,et al.  Beating the PNS attack in practical quantum cryptography , 2004 .

[11]  Won-Young Hwang Quantum key distribution with high loss: toward global secure communication. , 2003, Physical review letters.

[12]  Deutsch,et al.  Quantum Privacy Amplification and the Security of Quantum Cryptography over Noisy Channels. , 1996, Physical review letters.

[13]  John Preskill,et al.  Security of quantum key distribution with imperfect devices , 2002, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..

[14]  Lo,et al.  Unconditional security of quantum key distribution over arbitrarily long distances , 1999, Science.

[15]  G. Guo,et al.  Faraday-Michelson system for quantum cryptography. , 2005, Optics letters.

[16]  Herbert Walther,et al.  Continuous generation of single photons with controlled waveform in an ion-trap cavity system , 2004, Nature.

[17]  Artur Ekert,et al.  Information Gain in Quantum Eavesdropping , 1994 .

[18]  N. Lütkenhaus Security against individual attacks for realistic quantum key distribution , 2000 .

[19]  P. Oscar Boykin,et al.  A Proof of the Security of Quantum Key Distribution , 1999, Symposium on the Theory of Computing.

[20]  Xiang-Bin Wang A decoy-state protocol for quantum cryptography with 4 intensities of coherent states , 2008 .

[21]  Tor Helleseth,et al.  Advances in Cryptology — EUROCRYPT ’93 , 2001, Lecture Notes in Computer Science.

[22]  Gilles Brassard,et al.  Secret-Key Reconciliation by Public Discussion , 1994, EUROCRYPT.

[23]  Ekert,et al.  Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.

[24]  Dominic Mayers,et al.  Unconditional security in quantum cryptography , 1998, JACM.

[25]  David Deutsch,et al.  Erratum: Quantum Privacy Amplification and the Security of Quantum Cryptography over Noisy Channels [Phys. Rev. Lett. 77, 2818 (1996)] , 1998 .

[26]  David P. DiVincenzo,et al.  Quantum information and computation , 2000, Nature.