793 research outputs found
Passive scheme with a photon-number-resolving detector for monitoring the untrusted source in a plug-and-play quantum-key-distribution system
A passive scheme with a beam splitter and a photon-number-resolving (PNR)
detector is proposed to verify the photon statistics of an untrusted source in
a plug-and-play quantum-key-distribution system by applying a three-intensity
decoy-state protocol. The practical issues due to statistical fluctuation and
detection noise are analyzed. The simulation results show that the scheme can
work efficiently when the total number of optical pulses sent from Alice to Bob
is above 10^8, and the dark count rate of the PNR detector is below 0.5
counts/pulse, which is realizable with current techniques. Furthermore, we
propose a practical realization of the PNR detector with a variable optical
attenuator combined with a threshold detector.Comment: 8 pages, 6 figure
Continuous-variable measurement-device-independent quantum key distribution with virtual photon subtraction
The method of improving the performance of continuous-variable quantum key
distribution protocols by post-selection has been recently proposed and
verified. In continuous-variable measurement-device-independent quantum key
distribution (CV-MDI QKD) protocols, the measurement results are obtained from
untrusted third party Charlie. There is still not an effective method of
improving CV-MDI QKD by the post-selection with untrusted measurement. We
propose a method to improve the performance of coherent-state CV-MDI QKD
protocol by non-Gaussian post-selection. The non-Gaussian post-selection of
transmitted data is equivalent to an ideal photon subtraction on the two-mode
squeezed vacuum state, which is favorable to enhance the performance of CV-MDI
QKD. In CV-MDI QKD protocol with non-Gaussian post-selection, two users select
their own data independently. We demonstrate that the optimal performance of
the renovated CV-MDI QKD protocol is obtained with the transmitted data only
selected by Alice. By setting appropriate parameters of the non-Gaussian
post-selection, the secret key rate and tolerable excess noise are both
improved at long transmission distance. The method provides an effective
optimization scheme for the application of CV-MDI QKD protocols
Experimental quantum key distribution with an untrusted source
The photon statistics of a quantum key distribution (QKD) source is crucial
for security analysis. In this paper, we propose a practical method, with only
a beam splitter and photodetector involved, to monitor the photon statistics of
a QKD source. By implementing in a Plug&Play QKD system, we show that the
method is highly practical. The final secure key rate is 52 bit/s, comparing to
78 bit/s when the source is treated as a trusted source.Comment: 8 pages, 3 figure
Passive-scheme analysis for solving untrusted source problem in quantum key distribution
As a practical method, the passive scheme is useful to monitor the photon
statistics of an untrusted source in a "Plug & Play" quantum key distribution
(QKD) system. In a passive scheme, three kinds of monitor mode can be adopted:
average photon number (APN) monitor, photon number analyzer (PNA) and photon
number distribution (PND) monitor. In this paper, the security analysis is
rigorously given for APN monitor, while for PNA, the analysis including
statistical fluctuation and random noise, is addressed with a confidence level.
The results show that the PNA can achieve better performance than the APN
monitor and can asymptotically approach the theoretical limit of the PND
monitor. Also, the passive scheme with the PNA works efficiently when the
signal-to-noise ratio () is not too low and so is highly applicable to
solve the untrusted source problem in the QKD system.Comment: 8 pages, 6 figures, published versio
Source monitoring for continuous-variable quantum key distribution
The noise in optical source needs to be characterized for the security of
continuous-variable quantum key distribution (CVQKD). Two feasible schemes,
based on either active optical switch or passive beamsplitter are proposed to
monitor the variance of source noise, through which, Eve's knowledge can be
properly estimated. We derive the security bounds for both schemes against
collective attacks in the asymptotic case, and find that the passive scheme
performs better.Comment: The first version. 9 pages and 4 figure
- …