Practical security of wavelength-multiplexed decoy-state quantum key distribution

被引:14
|
作者
Zhao, Liang-Yuan [1 ,2 ,3 ]
Wu, Qian-Jun [1 ]
Qiu, Hong-Kang [1 ]
Qian, Jian-Lin [2 ]
Han, Zheng-Fu [3 ]
机构
[1] Jiangsu Hengtong Qasky Quantum Informat Res Inst, Suzhou 215200, Jiangsu, Peoples R China
[2] Jiangsu Hengtong Opt Elect Co Ltd, Suzhou 215200, Jiangsu, Peoples R China
[3] Univ Sci & Technol China, Key Lab Quantum Informat, CAS, Hefei 230026, Anhui, Peoples R China
基金
中国博士后科学基金;
关键词
TRANSMISSION;
D O I
10.1103/PhysRevA.103.022429
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
Wavelength division multiplexing (WDM) of quantum key distribution (QKD) with classical optical channels has been proven to be feasible experimentally. In this paper, we will analyze the practical security of WDM-QKD theoretically. Specifically, we first establish the noise model of classical signals. Then, the influence of classical noises on the performance of decoy-state WDM-QKD is studied with a finite-key security analysis. For numerical simulations, the effect of classical noise-reduction methods for different experimental settings is given. The secret key rate and maximum transmission distance of WDM-QKD is simulated with various sent number of quantum pulses or transmitted power of classical signals. Furthermore, the performance of two kinds of decoy-state WDM-QKD is compared, which shows that the optimal decoy-state protocol for WDM-QKD is related to the sent number of quantum pulses. Since WDM-QKD is desired to reduce the cost of QKD networks and since experiments have already been carried out, our work can not only close the gap between theory and practice, but also be used to optimize the experimental parameters and improve its performance.
引用
收藏
页数:10
相关论文
共 50 条
  • [31] Finite-key analysis of a practical decoy-state high-dimensional quantum key distribution
    Bao, Haize
    Bao, Wansu
    Wang, Yang
    Zhou, Chun
    Chen, Ruike
    JOURNAL OF PHYSICS A-MATHEMATICAL AND THEORETICAL, 2016, 49 (20)
  • [32] Free-space decoy-state quantum key distribution
    Fuerst, M.
    Schmitt-Manderbach, T.
    Weier, H.
    Ursin, R.
    Tiefenbacher, F.
    Scheidl, T.
    Barbieri, C.
    Perdigues, J.
    Sodnik, Z.
    Kurtsiefer, C.
    Rarity, J. G.
    Zeilinger, A.
    Weinfurter, H.
    2008 CONFERENCE ON OPTICAL FIBER COMMUNICATION/NATIONAL FIBER OPTIC ENGINEERS CONFERENCE, VOLS 1-8, 2008, : 2765 - 2767
  • [33] Reexamination of decoy-state quantum key distribution with biased bases
    Yu, Zong-Wen
    Zhou, Yi-Heng
    Wang, Xiang-Bin
    PHYSICAL REVIEW A, 2016, 93 (03)
  • [34] Passive Decoy-State Quantum Key Distribution with Coherent Light
    Curty, Marcos
    Jofre, Marc
    Pruneri, Valerio
    Mitchell, Morgan W.
    ENTROPY, 2015, 17 (06) : 4064 - 4082
  • [35] Decoy-state quantum key distribution with biased basis choice
    Zhengchao Wei
    Weilong Wang
    Zhen Zhang
    Ming Gao
    Zhi Ma
    Xiongfeng Ma
    Scientific Reports, 3
  • [36] Decoy-state quantum key distribution with biased basis choice
    Wei, Zhengchao
    Wang, Weilong
    Zhang, Zhen
    Gao, Ming
    Ma, Zhi
    Ma, Xiongfeng
    SCIENTIFIC REPORTS, 2013, 3
  • [37] Decoy-state quantum key distribution using homodyne detection
    Mousavi, S. H. Shams
    Gallion, P.
    PHYSICAL REVIEW A, 2009, 80 (01):
  • [38] Reexamination of the decoy-state quantum key distribution with an unstable source
    Hu, Jia-Zhong
    Wang, Xiang-Bin
    PHYSICAL REVIEW A, 2010, 82 (01):
  • [39] Practical underwater quantum key distribution based on decoy-state BB84 protocol
    Dong, Shanchuan
    Yu, Yonghe
    Zheng, Shangshuai
    Zhu, Qiming
    Gai, Lei
    Li, Wendong
    Gu, Yongjian
    APPLIED OPTICS, 2022, 61 (15) : 4471 - 4477
  • [40] Security bounds for decoy-state quantum key distribution with arbitrary photon-number statistics
    Foletto, Giulio
    Picciariello, Francesco
    Agnesi, Costantino
    Villoresi, Paolo
    Vallone, Giuseppe
    PHYSICAL REVIEW A, 2022, 105 (01)