Practical security of wavelength-multiplexed decoy-state quantum key distribution

被引:14
|
作者
Zhao, Liang-Yuan [1 ,2 ,3 ]
Wu, Qian-Jun [1 ]
Qiu, Hong-Kang [1 ]
Qian, Jian-Lin [2 ]
Han, Zheng-Fu [3 ]
机构
[1] Jiangsu Hengtong Qasky Quantum Informat Res Inst, Suzhou 215200, Jiangsu, Peoples R China
[2] Jiangsu Hengtong Opt Elect Co Ltd, Suzhou 215200, Jiangsu, Peoples R China
[3] Univ Sci & Technol China, Key Lab Quantum Informat, CAS, Hefei 230026, Anhui, Peoples R China
基金
中国博士后科学基金;
关键词
TRANSMISSION;
D O I
10.1103/PhysRevA.103.022429
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
Wavelength division multiplexing (WDM) of quantum key distribution (QKD) with classical optical channels has been proven to be feasible experimentally. In this paper, we will analyze the practical security of WDM-QKD theoretically. Specifically, we first establish the noise model of classical signals. Then, the influence of classical noises on the performance of decoy-state WDM-QKD is studied with a finite-key security analysis. For numerical simulations, the effect of classical noise-reduction methods for different experimental settings is given. The secret key rate and maximum transmission distance of WDM-QKD is simulated with various sent number of quantum pulses or transmitted power of classical signals. Furthermore, the performance of two kinds of decoy-state WDM-QKD is compared, which shows that the optimal decoy-state protocol for WDM-QKD is related to the sent number of quantum pulses. Since WDM-QKD is desired to reduce the cost of QKD networks and since experiments have already been carried out, our work can not only close the gap between theory and practice, but also be used to optimize the experimental parameters and improve its performance.
引用
收藏
页数:10
相关论文
共 50 条
  • [11] Optimizing Decoy-State Protocols for Practical Quantum Key Distribution Systems
    Fan-Yuan, Guan-Jie
    Wang, Ze-Hao
    Wang, Shuang
    Yin, Zhen-Qiang
    Chen, Wei
    He, De-Yong
    Guo, Guang-Can
    Han, Zheng-Fu
    ADVANCED QUANTUM TECHNOLOGIES, 2021, 4 (04)
  • [12] Security of Decoy-State Quantum Key Distribution with Correlated Intensity Fluctuations
    Sixto, Xoel
    Zapatero, Victor
    Curty, Marcos
    PHYSICAL REVIEW APPLIED, 2022, 18 (04)
  • [13] Passive decoy-state quantum key distribution with practical light sources
    Curty, Marcos
    Ma, Xiongfeng
    Qi, Bing
    Moroder, Tobias
    PHYSICAL REVIEW A, 2010, 81 (02)
  • [14] Nonorthogonal decoy-state quantum key distribution
    Li, JB
    Fang, XM
    CHINESE PHYSICS LETTERS, 2006, 23 (04) : 775 - 778
  • [15] Practical decoy-state BB84 quantum key distribution with quantum memory
    李咸柯
    宋小谦
    郭其伟
    周星宇
    王琴
    Chinese Physics B, 2021, (06) : 77 - 80
  • [16] Practical decoy-state BB84 quantum key distribution with quantum memory*
    Li, Xian-Ke
    Song, Xiao-Qian
    Guo, Qi-Wei
    Zhou, Xing-Yu
    Wang, Qin
    CHINESE PHYSICS B, 2021, 30 (06)
  • [17] Practical decoy-state method for twin-field quantum key distribution
    Grasselli, Federico
    Curty, Marcos
    NEW JOURNAL OF PHYSICS, 2019, 21 (07)
  • [18] Rationality and Security Verification of Indistinguishability Assumption in Decoy-State Quantum Key Distribution
    Chen, Xiaoming
    Chen, Lei
    Yan, Yalong
    Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2022, 51 (04): : 482 - 487
  • [19] Practical decoy-state measurement-device-independent quantum key distribution
    Sun, Shi-Hai
    Gao, Ming
    Li, Chun-Yan
    Liang, Lin-Mei
    PHYSICAL REVIEW A, 2013, 87 (05):
  • [20] Experimental passive decoy-state quantum key distribution
    Sun, Qi-Chao
    Wang, Wei-Long
    Liu, Yang
    Zhou, Fei
    Pelc, Jason S.
    Fejer, M. M.
    Peng, Cheng-Zhi
    Chen, Xianfeng
    Ma, Xiongfeng
    Zhang, Qiang
    Pan, Jian-Wei
    LASER PHYSICS LETTERS, 2014, 11 (08)