Multimode states in decoy-based quantum-key-distribution protocols

نویسندگان

  • Wolfram Helwig
  • Wolfgang Mauerer
  • Christine Silberhorn
چکیده

Every security analysis of quantum-key distribution QKD relies on a faithful modeling of the employed quantum states. Many photon sources, such as for instance a parametric down-conversion PDC source, require a multimode description but are usually only considered in a single-mode representation. In general, the important claim in decoy-based QKD protocols for indistinguishability between signal and decoy states does not hold for all sources. We derive bounds on the single-photon transmission probability and error rate for multimode states and apply these bounds to the output state of a PDC source. We observe two opposing effects on the secure key rate. First, the multimode structure of the state gives rise to a new attack that decreases the key rate. Second, more contributing modes change the photon number distribution from a thermal toward a Poissonian distribution, which increases the key rate.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

200km Decoy-state quantum key distribution with photon polarization

We demonstrate the decoy-state quantum key distribution over 200 km with photon polarization through optical fiber, by using superconducting single photon detector with a repetition rate of 320 Mega Hz and a dark count rate of lower than 1 Hz. Since we have used the polarization coding, the synchronization pulses can be run in a low frequency. The final key rate is 14.1 Hz. The experiment lasts...

متن کامل

Security analysis of the time-coding quantum key distribution protocols

We report the security analysis of time-coding quantum key distribution protocols. The protocols make use of coherent single-photon pulses. The key is encoded in the photon time-detection. The use of coherent superposition of states allows to detect eavesdropping of the key. We give a mathematical model of a first protocol from which we derive a second, simpler, protocol. We derive the security...

متن کامل

Experimental Decoy State Quantum Key Distribution Over 15km

Decoy state protocols have recently been proposed as an innovative approach to improve dramatically the performance of quantum key distribution systems. Here, we present the first experimental demonstration of decoy state quantum key distribution, over 15km of Telecom fibers.

متن کامل

Practical decoy state for quantum key distribution

Decoy states have recently been proposed as a useful method for substantially improving the performance of quantum key distribution QKD . Here, we present a general theory of the decoy state protocol based on only two decoy states and one signal state. We perform optimization on the choice of intensities of the two decoy states and the signal state. Our result shows that a decoy state protocol ...

متن کامل

Performance of two quantum-key-distribution protocols

We compare the performance of Bennett-Brassard 1984 BB84 and Scarani-Acin-Ribordy-Gisin 2004 SARG04 protocols, the latter of which was proposed by V. Scarani et al. Phys. Rev. Lett. 92, 057901 2004 . Specifically, in this paper, we investigate the SARG04 protocol with two-way classical communications and the SARG04 protocol with decoy states. In the first part of the paper, we show that the SAR...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009