Article

Upper bounds for the secure key rate of decoy state quantum key distribution

Physical Review A (Impact Factor: 2.99). 01/2009; 79(3). DOI: 10.1103/PhysRevA.79.032335
Source: arXiv

ABSTRACT The use of decoy states in quantum key distribution (QKD) has provided a method for substantially increasing the secret key rate and distance that can be covered by QKD protocols with practical signals. The security analysis of these schemes, however, leaves open the possibility that the development of better proof techniques, or better classical post-processing methods, might further improve their performance in realistic scenarios. In this paper, we derive upper bounds on the secure key rate for decoy state QKD. These bounds are based basically only on the classical correlations established by the legitimate users during the quantum communication phase of the protocol. The only assumption about the possible post-processing methods is that double click events are randomly assigned to single click events. Further we consider only secure key rates based on the uncalibrated device scenario which assigns imperfections such as detection inefficiency to the eavesdropper. Our analysis relies on two preconditions for secure two-way and one-way QKD: The legitimate users need to prove that there exists no separable state (in the case of two-way QKD), or that there exists no quantum state having a symmetric extension (one-way QKD), that is compatible with the available measurements results. Both criteria have been previously applied to evaluate single-photon implementations of QKD. Here we use them to investigate a realistic source of weak coherent pulses. The resulting upper bounds can be formulated as a convex optimization problem known as a semidefinite program which can be efficiently solved. For the standard four-state QKD protocol, they are quite close to known lower bounds, thus showing that there are clear limits to the further improvement of classical post-processing techniques in decoy state QKD. Comment: 10 pages, 3 figures

Download full-text

Full-text

Available from: Hoi-Kwong Lo, Sep 01, 2015
0 Followers
 · 
103 Views
 · 
52 Downloads
  • [Show abstract] [Hide abstract]
    ABSTRACT: Considering fluctuant dark count rate in practical quantum key distribution (QKD) system, a new decoy-state method with one vacuum state and one weak decoy state is presented based on a heralded single photon source (HSPS). The method assumes that the dark count rate of each pulse is random and independent. The lower bound of the count rate and the upper bound of the error rate of a single photon state are estimated. The method is applied to the decoy-state QKD system with and without the fluctuation of dark count rate. Because the estimation of the upper bound of a single photon state’s error rate is stricter, the method can obtain better performance than the existing methods under the same condition of implementation.
    Optoelectronics Letters 09/2012; 8(5). DOI:10.1007/s11801-012-2026-y
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: We propose a simple but effective scheme for characterizing photon-number statistics of a practical single-photon source. In this scheme, the variable attenuation method which frequently appears in decoy state quantum cryptography is utilized here to enhance the estimation of photon-number statistics. A much stricter bound for vacuum and single-photon proportions is obtained and this result, in turn, is shown to be applicable to the unconditional secure quantum cryptographic communication with single-photon devices.
    Physical Review A 10/2009; 80(4). DOI:10.1103/PhysRevA.80.043807 · 2.99 Impact Factor
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: We propose and experimentally demonstrate that, contrary to what was thought up to now, an efficient BB84 operation is feasible using the double phase modulator (PM-PM) configuration in frequency-coded quantum key distribution systems without dispersion compensation. This is achieved by exploiting the chromatic dispersion provided by the fiber linking Alice and Bob. Thus, we refer to this system as dispersion supported or as the DS BB84 PM-PM configuration.
    IEEE Photonics Journal 06/2011; 3(3):433-440. DOI:10.1109/JPHOT.2011.2146764 · 2.33 Impact Factor
Show more