Analysis of decoy state quantum-key-distribution system
Author(s) -
Rongzhen Jiao,
Wenhan Zhang
Publication year - 2009
Publication title -
acta physica sinica
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.199
H-Index - 47
ISSN - 1000-3290
DOI - 10.7498/aps.58.2189
Subject(s) - decoy , quantum key distribution , key generation , computer science , signal (programming language) , state (computer science) , physics , topology (electrical circuits) , photon , statistical physics , quantum mechanics , algorithm , mathematics , cryptography , biochemistry , chemistry , receptor , combinatorics , programming language
The security of quantum-key-distribution system is analyzed using the decoy state protocol with two weak decoy states and one signal state. The comparison is based on the key generation rate as a function of distance for two types of decoy states: the vacuum and a weak decoy state, asymptotically approaching the theoretical limit of the most general type of decoy protocol, one-decoy-state protocol. We studied the two-decoy-state protocol in connection with the intensity of signal state, and the gain of signal states, the overall quantum bit error rate, the gain of single-photon states and the error rate of single-photon states and arrived at the optimal condition which maximizes the key generation rate.
Accelerating Research
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom
Address
John Eccles HouseRobert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom