A Simple Scheme for Realizing the Passive Decoy-State Quantum Key Distribution

In this paper, we present a scheme on realizing the passive decoy-state quantum key distribution. In this scheme, two weak coherent pulses interfere at a beam-splitter, and pulses in one output port are split by one beam-splitter into two parts which are sent into two local detectors individually. Then, all the clicking and nonclicking events from the local detectors are used to herald the arriving and nonarriving of the signal pulse in the other output port. Accordingly, we can obtain more decoy states in the photon-number space and can thus, achieve more precise estimations for single-photon contributions. In this scheme, we use only one intensity at each input of the beam-splitter to avoid intensity modulation fluctuations existing in other active decoy-state methods. We compare the present scheme with Curty et al.'s passive scheme and the conventional three-intensity decoy-state scheme with the weak coherent sources. Through numerical simulations, we demonstrate that this scheme is better than the other two methods.

[1]  Sanders,et al.  Limitations on practical quantum cryptography , 2000, Physical review letters.

[2]  V. Scarani,et al.  Device-independent security of quantum cryptography against collective attacks. , 2007, Physical review letters.

[3]  J. P. von der Weid,et al.  Quantum random number generation enhanced by weak-coherent states interference. , 2016, Optics express.

[4]  H. Bechmann-Pasquinucci,et al.  Quantum cryptography , 2001, quant-ph/0101098.

[5]  John Preskill,et al.  Security of quantum key distribution with imperfect devices , 2002, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..

[6]  Guilherme P. Temporao,et al.  Linear-optic heralded photon source , 2015 .

[7]  T. Moroder,et al.  Heralded-qubit amplifiers for practical device-independent quantum key distribution , 2011, 1105.2573.

[8]  Xiang‐Bin Wang,et al.  Beating the PNS attack in practical quantum cryptography , 2004 .

[9]  N. Lütkenhaus Security against individual attacks for realistic quantum key distribution , 2000 .

[10]  G. Guo,et al.  Measurement-device-independent quantum key distribution robust against environmental disturbances , 2017 .

[11]  Xiongfeng Ma,et al.  ar X iv : q ua ntp h / 05 12 08 0 v 2 1 1 A pr 2 00 6 TIMESHIFT ATTACK IN PRACTICAL QUANTUM , 2005 .

[12]  T. Moroder,et al.  Passive decoy-state quantum key distribution with practical light sources , 2009, 0911.2815.

[13]  Zhu Cao,et al.  Discrete-phase-randomized coherent state source and its application in quantum key distribution , 2014, 1410.3217.

[14]  Xiongfeng Ma,et al.  Decoy state quantum key distribution. , 2004, Physical review letters.

[15]  P. Grangier,et al.  Continuous variable quantum cryptography using coherent states. , 2001, Physical review letters.

[16]  Hui Liu,et al.  Measurement-Device-Independent Quantum Key Distribution Over a 404 km Optical Fiber. , 2016, Physical review letters.

[17]  N. Gisin,et al.  Proposal for implementing device-independent quantum key distribution based on a heralded qubit amplifier. , 2010, Physical review letters.

[18]  Gerd Leuchs,et al.  Device calibration impacts security of quantum key distribution. , 2011, Physical review letters.

[19]  T. Moroder,et al.  Non-Poissonian statistics from Poissonian light sources with application to passive decoy state quantum key distribution. , 2009, Optics letters.

[20]  H. Lo,et al.  Practical Decoy State for Quantum Key Distribution , 2005, quant-ph/0503005.

[21]  Jian-Wei Pan,et al.  General theory of decoy-state quantum cryptography with source errors , 2006, quant-ph/0612121.

[22]  J. Skaar,et al.  Hacking commercial quantum cryptography systems by tailored bright illumination , 2010, 1008.4593.

[23]  Horace P. Yuen,et al.  Quantum amplifiers, quantum duplicators and quantum cryptography , 1996 .

[24]  M. Curty,et al.  Measurement-device-independent quantum key distribution. , 2011, Physical review letters.

[25]  Qin Wang,et al.  Scheme for realizing passive quantum key distribution with heralded single-photon sources , 2016 .

[26]  Ekert,et al.  Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.

[27]  Shi-Hai Sun,et al.  Experimental demonstration of passive-decoy-state quantum key distribution with two independent lasers , 2016 .

[28]  Hoi-Kwong Lo,et al.  Phase-Remapping Attack in Practical Quantum Key Distribution Systems , 2006, ArXiv.

[29]  N. Imoto,et al.  Quantum cryptography with coherent states , 1995, Technical Digest. CLEO/Pacific Rim'95. The Pacific Rim Conference on Lasers and Electro-Optics.

[30]  P. A. Hiskett,et al.  Experimental decoy state quantum key distribution , 2007, 2007 Quantum Electronics and Laser Science Conference.

[31]  Won-Young Hwang Quantum key distribution with high loss: toward global secure communication. , 2003, Physical review letters.

[32]  Masato Koashi,et al.  Simple and efficient quantum key distribution with parametric down-conversion. , 2007, Physical review letters.

[33]  Gilles Brassard,et al.  Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..