Decoy-state quantum key distribution with both source errors and statistical fluctuations

被引:89
|
作者
Wang, Xiang-Bin [1 ,2 ]
Yang, Lin [1 ,3 ]
Peng, Cheng-Zhi [1 ,4 ,5 ]
Pan, Jian-Wei [1 ,4 ,5 ,6 ]
机构
[1] Tsinghua Univ, Dept Phys, Beijing 100084, Peoples R China
[2] Tsinghua Natl Lab Informat Sci & Technol, Beijing 100084, Peoples R China
[3] Shandong Univ, Key Lab Cryptol Technol & Informat Secur, Minist Educ, Jinan 250100, Peoples R China
[4] Univ Sci & Technol China, Hefei Natl Lab Phys Sci Microscale, Hefei 230026, Anhui, Peoples R China
[5] Univ Sci & Technol China, Dept Modern Phys, Hefei 230026, Anhui, Peoples R China
[6] Heidelberg Univ, Inst Phys, D-69120 Heidelberg, Germany
来源
NEW JOURNAL OF PHYSICS | 2009年 / 11卷
关键词
SECURITY; NUMBER;
D O I
10.1088/1367-2630/11/7/075006
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
We show how to calculate the fraction of single-photon counts of the 3-intensity decoy-state quantum cryptography faithfully with both statistical fluctuations and source errors. Our results rely only on the bound values of a few parameters of the states of pulses.
引用
收藏
页数:17
相关论文
共 50 条
  • [31] SARG04 decoy-state quantum key distribution based on an unstable source
    周媛媛
    周学军
    OptoelectronicsLetters, 2011, 7 (05) : 389 - 393
  • [32] Security Bounds for Efficient Decoy-State Quantum Key Distribution
    Lucamarini, Marco
    Dynes, James F.
    Froehlich, Bernd
    Yuan, Zhiliang
    Shields, Andrew J.
    IEEE JOURNAL OF SELECTED TOPICS IN QUANTUM ELECTRONICS, 2015, 21 (03) : 1 - 8
  • [33] Passive decoy-state quantum key distribution using weak coherent pulses with intensity fluctuations
    Li, Yuan
    Bao, Wan-su
    Li, Hong-wei
    Zhou, Chun
    Wang, Yang
    PHYSICAL REVIEW A, 2014, 89 (03):
  • [34] Free-space decoy-state quantum key distribution
    Fuerst, M.
    Schmitt-Manderbach, T.
    Weier, H.
    Ursin, R.
    Tiefenbacher, F.
    Scheidl, T.
    Barbieri, C.
    Perdigues, J.
    Sodnik, Z.
    Kurtsiefer, C.
    Rarity, J. G.
    Zeilinger, A.
    Weinfurter, H.
    2008 CONFERENCE ON OPTICAL FIBER COMMUNICATION/NATIONAL FIBER OPTIC ENGINEERS CONFERENCE, VOLS 1-8, 2008, : 2765 - 2767
  • [35] Efficient decoy-state quantum key distribution with quantified security
    Lucamarini, M.
    Patel, K. A.
    Dynes, J. F.
    Froehlich, B.
    Sharpe, A. W.
    Dixon, A. R.
    Yuan, Z. L.
    Penty, R. V.
    Shields, A. J.
    OPTICS EXPRESS, 2013, 21 (21): : 24550 - 24565
  • [36] Reexamination of decoy-state quantum key distribution with biased bases
    Yu, Zong-Wen
    Zhou, Yi-Heng
    Wang, Xiang-Bin
    PHYSICAL REVIEW A, 2016, 93 (03)
  • [37] Passive Decoy-State Quantum Key Distribution with Coherent Light
    Curty, Marcos
    Jofre, Marc
    Pruneri, Valerio
    Mitchell, Morgan W.
    ENTROPY, 2015, 17 (06) : 4064 - 4082
  • [38] Decoy-state quantum key distribution with biased basis choice
    Zhengchao Wei
    Weilong Wang
    Zhen Zhang
    Ming Gao
    Zhi Ma
    Xiongfeng Ma
    Scientific Reports, 3
  • [39] Decoy-state quantum key distribution with biased basis choice
    Wei, Zhengchao
    Wang, Weilong
    Zhang, Zhen
    Gao, Ming
    Ma, Zhi
    Ma, Xiongfeng
    SCIENTIFIC REPORTS, 2013, 3
  • [40] Decoy-state quantum key distribution using homodyne detection
    Mousavi, S. H. Shams
    Gallion, P.
    PHYSICAL REVIEW A, 2009, 80 (01):