Optimal Experimental Scheme for Practical BB84 Quantum Key Distribution Protocol with Weak Coherent Sources, Noisy and Lossy Channel

نویسنده

  • Qing-yu Cai
چکیده

It is the first scheme which allows the detection apparatus to achieve the photon number of arriving signals. Moreover, quantum bit error rates (QBERs) of multiphoton pulses can also be achieved precisely. Thus, our method is sensitive to the photon number splitting and resending (PNSR) attack, i.e., the eavesdropper (Eve) replaces one photon of the multiphoton pulse by a false one and forwards the pulse to the receiver, while the decoy-state protocols are not. In our scheme, Eve’s whatever attacks will be limited by using the improved decoy-state protocols and by checking the QBERs. Based on our multiphoton pulses detection apparatus, a quasi-single-photon protocol is presented to improve the security of the communication and the rate of the final key. We analyze that our scheme is optimal under today’s technology.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Optimal Experimental Scheme for Bennett-Brassard 1984 Quantum Key Distribution Protocol with Weak Coherent Sources, Noisy and Lossy Channel

It is the first scheme which allows the detection apparatus to achieve both the photon number of arriving signals and quantum bit error rate of the multiphoton pulses precisely. We show that the upper bound of the fraction of the tagged multiphoton pulses counts is μ, which is independent of the channel loss and the intensity of the decoy source. Such upper bound is inherent and cannot be reduc...

متن کامل

Security of quantum key distribution using weak coherent states with nonrandom phases

We prove the security of the Bennett-Brassard (BB84) quantum key distribution protocol in the case where the key information is encoded in the relative phase of a coherent-state reference pulse and a weak coherent-state signal pulse, as in some practical implementations of the protocol. In contrast to previous work, our proof applies even if the eavesdropper knows the phase of the reference pul...

متن کامل

ar X iv : q ua nt - p h / 06 11 04 4 v 1 3 N ov 2 00 6 Quantum key distribution with “ dual detectors ”

To improve the performance of a quantum key distribution (QKD) system, high speed, low dark count single photon detectors (or low noise homodyne detectors) are required. However, in practice, a fast detector usually is noisy. Here, we propose a “dual detectors” method to improve the performance of a practical QKD system with realistic detectors: the legitimate receiver randomly uses either a fa...

متن کامل

Quantum key distribution with realistic states: photon-number statistics in the photon-number splitting attack

Quantum key distribution can be performed with practical signal sources such as weak coherent pulses. One example of such a scheme is the Bennett–Brassard protocol that can be implemented via polarization of the signals, or equivalent signals. It turns out that the most powerful tool at the disposition of an eavesdropper is the photon-number splitting attack. We show that this attack can be ext...

متن کامل

Coherent State Quantum Key Distribution Without Random Basis Switching

The random switching of measurement bases is commonly assumed to be a necessary step of quantum key distribution protocols. In this paper we show that switching is not required for coherent state continuous variable quantum key distribution. We show this via the no-switching protocol which results in higher information rates and a simpler experimental setup. We propose an optimal eavesdropping ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005