New decoy state quantum key distribution for increasing the security communication distance

被引:0
|
作者
Liu D. [1 ]
Pei C.-X. [1 ]
Quan D.-X. [1 ]
Han B.-B. [1 ]
Zhao N. [1 ]
机构
[1] State Key Lab. of Integrated Service Networks, Xidian Univ.
关键词
Decoy state; Modified coherent state; Quantum communication; Quantum key distribution;
D O I
10.3969/j.issn.1001-2400.2010.01.003
中图分类号
学科分类号
摘要
To increase the security distance of quantum communication, a new scheme of decoy state quantum key distribution with a modified coherent state is proposed. The probability of multi-photon pulse in weak coherent source can be decreased by canceling two photon pulses to improve the security distance. Based on the math model of the decoy state QKD, the formula for the yield and error rate of the single photon pulse with the Modified Coherent State is deduced, and substituted in GLLP to calculate the generation rate of quantum keys. Results show that the decoy state with the Modified Coherent State can increase the secure communication distance about 10%, which is very close to that of the perfect decoy state QKD.
引用
收藏
页码:13 / 17
页数:4
相关论文
共 13 条
  • [1] Bennett C.H., Brassard G., Quantum cryptography: public key distribution and coin tossing, Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing, pp. 175-179, (1984)
  • [2] Zhu C., Pei C., Ma H., Et al., A scheme for quantum local area networks and performance analysis, Journal of Xidian University, 33, 6, pp. 839-843, (2006)
  • [3] Han B., Pei C., Chen N., Et al., Analysis of the effect of polarization mode dispersion on QKD, Journal of Xidian University, 35, 5, pp. 830-833, (2008)
  • [4] Hwang W.Y., Quantum key distribution with high loss toward global secure communication, Phys Rev Lett, 91, 5, (2003)
  • [5] Wang X.B., Beating the photon number splitting attack in practical quantum cryptography, Phys Rev Lett, 94, 23, (2005)
  • [6] Wang X.B., Quantum key distribution with 4 intensities of coherent light, Phys Rev A, 72, 1, (2005)
  • [7] Lo H.K., Ma X., Chen K., Decoy state quantum key distribution, Phys Rev Lett, 94, 23, (2005)
  • [8] Ma X., Qi B., Zhao Y., Et al., Practical decoy state for quantum key distribution, Phys Rev A, 72, 1, (2005)
  • [9] Zhao Y., Qi B., Ma X., Et al., Experimental quantum key distribution with decoy states, Phys Rev Lett, 96, 7, (2006)
  • [10] Peng C.Z., Zhang J., Yang D., Et al., Experimental long-distance decoy-state quantum key distribution based on polarization encoding, Phys Rev Lett, 98, 1, (2007)