Decoy-state quantum key distribution with both source errors and statistical fluctuations

被引:89
|
作者
Wang, Xiang-Bin [1 ,2 ]
Yang, Lin [1 ,3 ]
Peng, Cheng-Zhi [1 ,4 ,5 ]
Pan, Jian-Wei [1 ,4 ,5 ,6 ]
机构
[1] Tsinghua Univ, Dept Phys, Beijing 100084, Peoples R China
[2] Tsinghua Natl Lab Informat Sci & Technol, Beijing 100084, Peoples R China
[3] Shandong Univ, Key Lab Cryptol Technol & Informat Secur, Minist Educ, Jinan 250100, Peoples R China
[4] Univ Sci & Technol China, Hefei Natl Lab Phys Sci Microscale, Hefei 230026, Anhui, Peoples R China
[5] Univ Sci & Technol China, Dept Modern Phys, Hefei 230026, Anhui, Peoples R China
[6] Heidelberg Univ, Inst Phys, D-69120 Heidelberg, Germany
来源
NEW JOURNAL OF PHYSICS | 2009年 / 11卷
关键词
SECURITY; NUMBER;
D O I
10.1088/1367-2630/11/7/075006
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
We show how to calculate the fraction of single-photon counts of the 3-intensity decoy-state quantum cryptography faithfully with both statistical fluctuations and source errors. Our results rely only on the bound values of a few parameters of the states of pulses.
引用
收藏
页数:17
相关论文
共 50 条
  • [21] Decoy-state round-robin differential-phase-shift quantum key distribution with source errors
    Qian-Ping Mao
    Le Wang
    Sheng-Mei Zhao
    Quantum Information Processing, 2020, 19
  • [22] Source attack of decoy-state quantum key distribution using phase information
    Tang, Yan-Lin
    Yin, Hua-Lei
    Ma, Xiongfeng
    Fung, Chi-Hang Fred
    Liu, Yang
    Yong, Hai-Lin
    Chen, Teng-Yun
    Peng, Cheng-Zhi
    Chen, Zeng-Bing
    Pan, Jian-Wei
    PHYSICAL REVIEW A, 2013, 88 (02)
  • [23] Decoy-state round-robin differential-phase-shift quantum key distribution with source errors
    Mao, Qian-Ping
    Wang, Le
    Zhao, Sheng-Mei
    QUANTUM INFORMATION PROCESSING, 2020, 19 (02)
  • [24] General theory of decoy-state quantum cryptography with source errors
    Wang, Xiang-Bin
    Peng, Cheng-Zhi
    Zhang, Jun
    Yang, Lin
    Pan, Jian-Wei
    PHYSICAL REVIEW A, 2008, 77 (04)
  • [25] SARG04 decoy-state quantum key distribution based on an unstable source
    Zhou Y.
    Zhou X.
    Optoelectronics Letters, 2011, 7 (5) : 389 - 393
  • [26] Practical high-speed light source for decoy-state quantum key distribution
    Du, Haibin
    Liang, Yan
    Zhang, Shengxiang
    Chen, Xiuliang
    Zhao, Lin
    Chen, Jie
    Zeng, Heping
    CHINESE OPTICS LETTERS, 2014, 12 (07)
  • [27] Practical covert quantum key distribution with decoy-state method
    Fen-Zhuo Guo
    Li Liu
    An-Kang Wang
    Qiao-Yan Wen
    Quantum Information Processing, 2019, 18
  • [28] Tight security bounds for decoy-state quantum key distribution
    Hua-Lei Yin
    Min-Gang Zhou
    Jie Gu
    Yuan-Mei Xie
    Yu-Shuo Lu
    Zeng-Bing Chen
    Scientific Reports, 10
  • [29] Simple protocol for secure decoy-state quantum key distribution with a loosely controlled source
    Wang, Xiang-Bin
    Peng, Cheng-Zhi
    Pan, Jian-Wei
    APPLIED PHYSICS LETTERS, 2007, 90 (03)
  • [30] Practical high-speed light source for decoy-state quantum key distribution
    杜海彬
    梁焰
    张盛祥
    陈修亮
    赵林
    陈杰
    曾和平
    ChineseOpticsLetters, 2014, 12 (07) : 71 - 74