Practical security of wavelength-multiplexed decoy-state quantum key distribution

被引:14
|
作者
Zhao, Liang-Yuan [1 ,2 ,3 ]
Wu, Qian-Jun [1 ]
Qiu, Hong-Kang [1 ]
Qian, Jian-Lin [2 ]
Han, Zheng-Fu [3 ]
机构
[1] Jiangsu Hengtong Qasky Quantum Informat Res Inst, Suzhou 215200, Jiangsu, Peoples R China
[2] Jiangsu Hengtong Opt Elect Co Ltd, Suzhou 215200, Jiangsu, Peoples R China
[3] Univ Sci & Technol China, Key Lab Quantum Informat, CAS, Hefei 230026, Anhui, Peoples R China
基金
中国博士后科学基金;
关键词
TRANSMISSION;
D O I
10.1103/PhysRevA.103.022429
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
Wavelength division multiplexing (WDM) of quantum key distribution (QKD) with classical optical channels has been proven to be feasible experimentally. In this paper, we will analyze the practical security of WDM-QKD theoretically. Specifically, we first establish the noise model of classical signals. Then, the influence of classical noises on the performance of decoy-state WDM-QKD is studied with a finite-key security analysis. For numerical simulations, the effect of classical noise-reduction methods for different experimental settings is given. The secret key rate and maximum transmission distance of WDM-QKD is simulated with various sent number of quantum pulses or transmitted power of classical signals. Furthermore, the performance of two kinds of decoy-state WDM-QKD is compared, which shows that the optimal decoy-state protocol for WDM-QKD is related to the sent number of quantum pulses. Since WDM-QKD is desired to reduce the cost of QKD networks and since experiments have already been carried out, our work can not only close the gap between theory and practice, but also be used to optimize the experimental parameters and improve its performance.
引用
收藏
页数:10
相关论文
共 50 条
  • [1] Concise security bounds for practical decoy-state quantum key distribution
    Lim, Charles Ci Wen
    Curty, Marcos
    Walenta, Nino
    Xu, Feihu
    Zbinden, Hugo
    PHYSICAL REVIEW A, 2014, 89 (02):
  • [2] Parameters optimization based on neural network of practical wavelength division multiplexed decoy-state quantum key distribution
    Li, Jia-Hao
    Shi, Lei
    Li, Tian-Xiu
    Xue, Yang
    Zhang, Zhi-Yun
    Tang, Jie
    MODERN PHYSICS LETTERS B, 2021, 35 (31):
  • [3] Finite-key analysis based on neural network of practical wavelength division multiplexed decoy-state quantum key distribution
    Li Jiahao
    Shi Lei
    Wang Junhui
    Li Tianxiu
    Xue Yang
    AOPC 2021: OPTICAL SENSING AND IMAGING TECHNOLOGY, 2021, 12065
  • [4] Practical covert quantum key distribution with decoy-state method
    Fen-Zhuo Guo
    Li Liu
    An-Kang Wang
    Qiao-Yan Wen
    Quantum Information Processing, 2019, 18
  • [5] Tight security bounds for decoy-state quantum key distribution
    Hua-Lei Yin
    Min-Gang Zhou
    Jie Gu
    Yuan-Mei Xie
    Yu-Shuo Lu
    Zeng-Bing Chen
    Scientific Reports, 10
  • [6] Security Bounds for Efficient Decoy-State Quantum Key Distribution
    Lucamarini, Marco
    Dynes, James F.
    Froehlich, Bernd
    Yuan, Zhiliang
    Shields, Andrew J.
    IEEE JOURNAL OF SELECTED TOPICS IN QUANTUM ELECTRONICS, 2015, 21 (03) : 1 - 8
  • [7] Decoy-state quantum key distribution with practical light source
    Jiao Rong-Zhen
    Zhang Chao
    Ma Hai-Qiang
    ACTA PHYSICA SINICA, 2011, 60 (11)
  • [8] Efficient decoy-state quantum key distribution with quantified security
    Lucamarini, M.
    Patel, K. A.
    Dynes, J. F.
    Froehlich, B.
    Sharpe, A. W.
    Dixon, A. R.
    Yuan, Z. L.
    Penty, R. V.
    Shields, A. J.
    OPTICS EXPRESS, 2013, 21 (21): : 24550 - 24565
  • [9] Practical covert quantum key distribution with decoy-state method
    Guo, Fen-Zhuo
    Liu, Li
    Wang, An-Kang
    Wen, Qiao-Yan
    QUANTUM INFORMATION PROCESSING, 2019, 18 (04)
  • [10] Tight security bounds for decoy-state quantum key distribution
    Yin, Hua-Lei
    Zhou, Min-Gang
    Gu, Jie
    Xie, Yuan-Mei
    Lu, Yu-Shuo
    Chen, Zeng-Bing
    SCIENTIFIC REPORTS, 2020, 10 (01)