Passive preparation of BB84 signal states with coherent light

نویسندگان

  • Marcos CURTY
  • Xiongfeng MA
  • Hoi-Kwong LO
  • Norbert LÜTKENHAUS
چکیده

In a typical optical implementation of the Bennett-Brassard 1984 (so-called BB84) quantum key distribution protocol, the sender uses an active source to produce the required signal states. While active state preparation of BB84 signals is a simple and elegant solution in principle, in practice passive state preparation might be desirable in some scenarios, for instance, in those experimental setups operating at high transmission rates. Passive devices usually involve parametric down-conversion. Here we show that coherent light is also suitable for passive generation of BB84 signal states. Our method does not require any externally-driven element, but only linear optical components and photodetectors. The resulting key rate is similar to the one delivered by an active source.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security of quantum key distribution using weak coherent states with nonrandom phases

We prove the security of the Bennett-Brassard (BB84) quantum key distribution protocol in the case where the key information is encoded in the relative phase of a coherent-state reference pulse and a weak coherent-state signal pulse, as in some practical implementations of the protocol. In contrast to previous work, our proof applies even if the eavesdropper knows the phase of the reference pul...

متن کامل

Coherent State Quantum Key Distribution Without Random Basis Switching

The random switching of measurement bases is commonly assumed to be a necessary step of quantum key distribution protocols. In this paper we show that switching is not required for coherent state continuous variable quantum key distribution. We show this via the no-switching protocol which results in higher information rates and a simpler experimental setup. We propose an optimal eavesdropping ...

متن کامل

Security proof of a three-state quantum key distribution protocol without rotational symmetry

Standard security proofs of quantum key distribution (QKD) protocols often rely on symmetry arguments. In this paper, we prove the security of a three-state protocol that does not possess rotational symmetry. The three-state QKD protocol we consider involves three qubit states, where the first two states, |0z〉 and |1z〉, can contribute to key generation and the third state, |+〉 = (|0z〉 + |1z〉)/ ...

متن کامل

Optimal pulse to generate non - classical photon states photon blockade

VIa The single photon character of nonclassical states of light that can be generated using photon blockade is analyzed for time domain operation. We show that improved single photon statistics (single photon around 85% with a multi-photon of 8%) can be obtained by adequately choosing the parameters (mainly amplitude and pulseduration) of the driving laser pulses. An alternative method, where t...

متن کامل

Quantum Flows for Secret Key Distribution in the Presence of the Photon Number Splitting Attack

Physical implementations of quantum key distribution (QKD) protocols, like the Bennett-Brassard (BB84), are forced to use attenuated coherent quantum states, because the sources of single photon states are not functional yet for QKD applications. However, when using attenuated coherent states, the relatively high rate of multi-photonic pulses introduces vulnerabilities that can be exploited by ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011