z-logo
open-access-imgOpen Access
Analysis of decoy state quantum-key-distribution system
Author(s) -
Rongzhen Jiao,
Wenhan Zhang
Publication year - 2009
Publication title -
wuli xuebao
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.199
H-Index - 47
ISSN - 1000-3290
DOI - 10.7498/aps.58.2189
Subject(s) - decoy , quantum key distribution , key generation , computer science , signal (programming language) , state (computer science) , physics , topology (electrical circuits) , photon , statistical physics , quantum mechanics , algorithm , mathematics , cryptography , biochemistry , chemistry , receptor , combinatorics , programming language
The security of quantum-key-distribution system is analyzed using the decoy state protocol with two weak decoy states and one signal state. The comparison is based on the key generation rate as a function of distance for two types of decoy states: the vacuum and a weak decoy state, asymptotically approaching the theoretical limit of the most general type of decoy protocol, one-decoy-state protocol. We studied the two-decoy-state protocol in connection with the intensity of signal state, and the gain of signal states, the overall quantum bit error rate, the gain of single-photon states and the error rate of single-photon states and arrived at the optimal condition which maximizes the key generation rate.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here