Decoy state quantum key distribution with finite resources

被引:11
|
作者
Sun, Shi-Hai [1 ]
Liang, Lin-Mei [1 ]
Li, Cheng-Zu [1 ]
机构
[1] Natl Univ Def Technol, Dept Phys, Changsha 410073, Peoples R China
关键词
Decoy state; Quantum key distribution; Finite resources; SECURITY;
D O I
10.1016/j.physleta.2009.05.016
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
We apply the finite key analysis to the decoy state quantum key distribution scheme and obtain a practical key rate. By simulating an practical experiment setups and the Vacuum + Weak decoy state method, we show that both the key rate and maximal secure distance are reduced when the finite key analysis is considered. (C) 2009 Elsevier B.V. All rights reserved.
引用
收藏
页码:2533 / 2536
页数:4
相关论文
共 50 条
  • [21] Modeling decoy state Quantum Key Distribution systems
    Mailloux, L. O.
    Engle, R. D.
    Grimaila, M. R.
    Hodson, D. D.
    Colombi, J. M.
    McLaughlin, C. V.
    JOURNAL OF DEFENSE MODELING AND SIMULATION-APPLICATIONS METHODOLOGY TECHNOLOGY-JDMS, 2015, 12 (04): : 489 - 506
  • [22] Quantum Key Distribution: Examination of the Decoy State Protocol
    Mailloux, Logan O.
    Grimaila, Michael R.
    Colombi, John M.
    Hodson, Douglas D.
    Engle, Ryan D.
    McLaughlin, Colin V.
    Baumgartner, Gerald
    IEEE COMMUNICATIONS MAGAZINE, 2015, 53 (10) : 24 - 31
  • [23] Quantum key distribution with passive decoy state selection
    Mauerer, Wolfgang
    Silberhorn, Christine
    PHYSICAL REVIEW A, 2007, 75 (05):
  • [24] Tight finite-key analysis of a practical decoy-state quantum key distribution with unstable sources
    Wang, Yang
    Bao, Wan-Su
    Zhou, Chun
    Jiang, Mu-Sheng
    Li, Hong-Wei
    PHYSICAL REVIEW A, 2016, 94 (03)
  • [25] Finite-key analysis of a practical decoy-state high-dimensional quantum key distribution
    Bao, Haize
    Bao, Wansu
    Wang, Yang
    Zhou, Chun
    Chen, Ruike
    JOURNAL OF PHYSICS A-MATHEMATICAL AND THEORETICAL, 2016, 49 (20)
  • [26] Experimental demonstration of passive decoy state quantum key distribution
    Zhang Yang
    Wang Shuang
    Yin Zhen-Qiang
    Chen Wei
    Liang Wen-Ye
    Li Hong-Wei
    Guo Guang-Can
    Han Zheng-Fu
    CHINESE PHYSICS B, 2012, 21 (10)
  • [27] Decoy-state quantum key distribution with a leaky source
    Tamaki, Kiyoshi
    Curty, Marcos
    Lucamarini, Marco
    NEW JOURNAL OF PHYSICS, 2016, 18
  • [28] Experimental decoy state method for secure quantum key distribution
    Tomita, Akihisa
    2007 IEEE LEOS ANNUAL MEETING CONFERENCE PROCEEDINGS, VOLS 1 AND 2, 2007, : 478 - 479
  • [29] Experimental passive decoy-state quantum key distribution
    Sun, Qi-Chao
    Wang, Wei-Long
    Liu, Yang
    Zhou, Fei
    Pelc, Jason S.
    Fejer, M. M.
    Peng, Cheng-Zhi
    Chen, Xianfeng
    Ma, Xiongfeng
    Zhang, Qiang
    Pan, Jian-Wei
    LASER PHYSICS LETTERS, 2014, 11 (08)
  • [30] Analysis of decoy state quantum-key-distribution system
    Jiao Rong-Zhen
    Zhang Wen-Han
    ACTA PHYSICA SINICA, 2009, 58 (04) : 2189 - 2192