Practical security of wavelength-multiplexed decoy-state quantum key distribution

被引:14
|
作者
Zhao, Liang-Yuan [1 ,2 ,3 ]
Wu, Qian-Jun [1 ]
Qiu, Hong-Kang [1 ]
Qian, Jian-Lin [2 ]
Han, Zheng-Fu [3 ]
机构
[1] Jiangsu Hengtong Qasky Quantum Informat Res Inst, Suzhou 215200, Jiangsu, Peoples R China
[2] Jiangsu Hengtong Opt Elect Co Ltd, Suzhou 215200, Jiangsu, Peoples R China
[3] Univ Sci & Technol China, Key Lab Quantum Informat, CAS, Hefei 230026, Anhui, Peoples R China
基金
中国博士后科学基金;
关键词
TRANSMISSION;
D O I
10.1103/PhysRevA.103.022429
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
Wavelength division multiplexing (WDM) of quantum key distribution (QKD) with classical optical channels has been proven to be feasible experimentally. In this paper, we will analyze the practical security of WDM-QKD theoretically. Specifically, we first establish the noise model of classical signals. Then, the influence of classical noises on the performance of decoy-state WDM-QKD is studied with a finite-key security analysis. For numerical simulations, the effect of classical noise-reduction methods for different experimental settings is given. The secret key rate and maximum transmission distance of WDM-QKD is simulated with various sent number of quantum pulses or transmitted power of classical signals. Furthermore, the performance of two kinds of decoy-state WDM-QKD is compared, which shows that the optimal decoy-state protocol for WDM-QKD is related to the sent number of quantum pulses. Since WDM-QKD is desired to reduce the cost of QKD networks and since experiments have already been carried out, our work can not only close the gap between theory and practice, but also be used to optimize the experimental parameters and improve its performance.
引用
收藏
页数:10
相关论文
共 50 条
  • [41] A fully passive transmitter for decoy-state quantum key distribution
    Zapatero, Victor
    Wang, Wenyuan
    Curty, Marcos
    QUANTUM SCIENCE AND TECHNOLOGY, 2023, 8 (02)
  • [42] Practical decoy-state method in quantum key distribution with a heralded single-photon source
    Wang, Qin
    Wang, Xiang-Bin
    Guo, Guang-Can
    PHYSICAL REVIEW A, 2007, 75 (01):
  • [43] Practical decoy-state quantum key distribution method considering dark count rate fluctuation
    Zhou Yuan-yuan
    Jiang Hua
    Wang Ying-jian
    OPTOELECTRONICS LETTERS, 2012, 8 (05) : 384 - 388
  • [44] Practical decoy state for quantum key distribution
    Ma, XF
    Qi, B
    Zhao, Y
    Lo, HK
    PHYSICAL REVIEW A, 2005, 72 (01)
  • [45] Practical decoy-state quantum key distribution method considering dark count rate fluctuation
    周媛媛
    江华
    王瑛剑
    Optoelectronics Letters, 2012, 8 (05) : 384 - 388
  • [46] Practical decoy-state quantum key distribution method considering dark count rate fluctuation
    Yuan-yuan Zhou
    Hua Jiang
    Ying-jian Wang
    Optoelectronics Letters, 2012, 8 (5) : 384 - 388
  • [47] Practical attacks on decoy-state quantum-key-distribution systems with detector efficiency mismatch
    Fei, Yangyang
    Gao, Ming
    Wang, Weilong
    Li, Chaobo
    Ma, Zhi
    PHYSICAL REVIEW A, 2015, 91 (05):
  • [48] Upper bounds for the secure key rate of the decoy-state quantum key distribution
    Curty, Marcos
    Moroder, Tobias
    Ma, Xiongfeng
    Lo, Hoi-Kwong
    Luetkenhaus, Norbert
    PHYSICAL REVIEW A, 2009, 79 (03):
  • [49] Imperfect phase randomization and generalized decoy-state quantum key distribution
    Nahar, Shlok
    Upadhyaya, Twesh
    Lutkenhaus, Norbert
    PHYSICAL REVIEW APPLIED, 2023, 20 (06):
  • [50] Fair Efficiency Comparisons of Decoy-State Quantum Key Distribution Protocols
    Li Hongxin
    Gao Ming
    Yan Xueping
    Yan Bao
    Han Yu
    Shan Ling
    Ma Zhi
    CHINESE JOURNAL OF ELECTRONICS, 2018, 27 (02) : 241 - 249