793 research outputs found

    Passive scheme with a photon-number-resolving detector for monitoring the untrusted source in a plug-and-play quantum-key-distribution system

    Full text link
    A passive scheme with a beam splitter and a photon-number-resolving (PNR) detector is proposed to verify the photon statistics of an untrusted source in a plug-and-play quantum-key-distribution system by applying a three-intensity decoy-state protocol. The practical issues due to statistical fluctuation and detection noise are analyzed. The simulation results show that the scheme can work efficiently when the total number of optical pulses sent from Alice to Bob is above 10^8, and the dark count rate of the PNR detector is below 0.5 counts/pulse, which is realizable with current techniques. Furthermore, we propose a practical realization of the PNR detector with a variable optical attenuator combined with a threshold detector.Comment: 8 pages, 6 figure

    Continuous-variable measurement-device-independent quantum key distribution with virtual photon subtraction

    Full text link
    The method of improving the performance of continuous-variable quantum key distribution protocols by post-selection has been recently proposed and verified. In continuous-variable measurement-device-independent quantum key distribution (CV-MDI QKD) protocols, the measurement results are obtained from untrusted third party Charlie. There is still not an effective method of improving CV-MDI QKD by the post-selection with untrusted measurement. We propose a method to improve the performance of coherent-state CV-MDI QKD protocol by non-Gaussian post-selection. The non-Gaussian post-selection of transmitted data is equivalent to an ideal photon subtraction on the two-mode squeezed vacuum state, which is favorable to enhance the performance of CV-MDI QKD. In CV-MDI QKD protocol with non-Gaussian post-selection, two users select their own data independently. We demonstrate that the optimal performance of the renovated CV-MDI QKD protocol is obtained with the transmitted data only selected by Alice. By setting appropriate parameters of the non-Gaussian post-selection, the secret key rate and tolerable excess noise are both improved at long transmission distance. The method provides an effective optimization scheme for the application of CV-MDI QKD protocols

    Experimental quantum key distribution with an untrusted source

    Full text link
    The photon statistics of a quantum key distribution (QKD) source is crucial for security analysis. In this paper, we propose a practical method, with only a beam splitter and photodetector involved, to monitor the photon statistics of a QKD source. By implementing in a Plug&Play QKD system, we show that the method is highly practical. The final secure key rate is 52 bit/s, comparing to 78 bit/s when the source is treated as a trusted source.Comment: 8 pages, 3 figure

    Passive-scheme analysis for solving untrusted source problem in quantum key distribution

    Full text link
    As a practical method, the passive scheme is useful to monitor the photon statistics of an untrusted source in a "Plug & Play" quantum key distribution (QKD) system. In a passive scheme, three kinds of monitor mode can be adopted: average photon number (APN) monitor, photon number analyzer (PNA) and photon number distribution (PND) monitor. In this paper, the security analysis is rigorously given for APN monitor, while for PNA, the analysis including statistical fluctuation and random noise, is addressed with a confidence level. The results show that the PNA can achieve better performance than the APN monitor and can asymptotically approach the theoretical limit of the PND monitor. Also, the passive scheme with the PNA works efficiently when the signal-to-noise ratio (RSNR^{SN}) is not too low and so is highly applicable to solve the untrusted source problem in the QKD system.Comment: 8 pages, 6 figures, published versio

    Source monitoring for continuous-variable quantum key distribution

    Full text link
    The noise in optical source needs to be characterized for the security of continuous-variable quantum key distribution (CVQKD). Two feasible schemes, based on either active optical switch or passive beamsplitter are proposed to monitor the variance of source noise, through which, Eve's knowledge can be properly estimated. We derive the security bounds for both schemes against collective attacks in the asymptotic case, and find that the passive scheme performs better.Comment: The first version. 9 pages and 4 figure
    • …
    corecore