Cargando…
Finite-key security analyses on passive decoy-state QKD protocols with different unstable sources
In quantum communication, passive decoy-state QKD protocols can eliminate many side channels, but the protocols without any finite-key analyses are not suitable for in practice. The finite-key securities of passive decoy-state (PDS) QKD protocols with two different unstable sources, type-II parametr...
Autores principales: | , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Nature Publishing Group
2015
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4607920/ https://www.ncbi.nlm.nih.gov/pubmed/26471947 http://dx.doi.org/10.1038/srep15276 |
_version_ | 1782395574748708864 |
---|---|
author | Song, Ting-Ting Qin, Su-Juan Wen, Qiao-Yan Wang, Yu-Kun Jia, Heng-Yue |
author_facet | Song, Ting-Ting Qin, Su-Juan Wen, Qiao-Yan Wang, Yu-Kun Jia, Heng-Yue |
author_sort | Song, Ting-Ting |
collection | PubMed |
description | In quantum communication, passive decoy-state QKD protocols can eliminate many side channels, but the protocols without any finite-key analyses are not suitable for in practice. The finite-key securities of passive decoy-state (PDS) QKD protocols with two different unstable sources, type-II parametric down-convention (PDC) and phase randomized weak coherent pulses (WCPs), are analyzed in our paper. According to the PDS QKD protocols, we establish an optimizing programming respectively and obtain the lower bounds of finite-key rates. Under some reasonable values of quantum setup parameters, the lower bounds of finite-key rates are simulated. The simulation results show that at different transmission distances, the affections of different fluctuations on key rates are different. Moreover, the PDS QKD protocol with an unstable PDC source can resist more intensity fluctuations and more statistical fluctuation. |
format | Online Article Text |
id | pubmed-4607920 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2015 |
publisher | Nature Publishing Group |
record_format | MEDLINE/PubMed |
spelling | pubmed-46079202015-10-28 Finite-key security analyses on passive decoy-state QKD protocols with different unstable sources Song, Ting-Ting Qin, Su-Juan Wen, Qiao-Yan Wang, Yu-Kun Jia, Heng-Yue Sci Rep Article In quantum communication, passive decoy-state QKD protocols can eliminate many side channels, but the protocols without any finite-key analyses are not suitable for in practice. The finite-key securities of passive decoy-state (PDS) QKD protocols with two different unstable sources, type-II parametric down-convention (PDC) and phase randomized weak coherent pulses (WCPs), are analyzed in our paper. According to the PDS QKD protocols, we establish an optimizing programming respectively and obtain the lower bounds of finite-key rates. Under some reasonable values of quantum setup parameters, the lower bounds of finite-key rates are simulated. The simulation results show that at different transmission distances, the affections of different fluctuations on key rates are different. Moreover, the PDS QKD protocol with an unstable PDC source can resist more intensity fluctuations and more statistical fluctuation. Nature Publishing Group 2015-10-16 /pmc/articles/PMC4607920/ /pubmed/26471947 http://dx.doi.org/10.1038/srep15276 Text en Copyright © 2015, Macmillan Publishers Limited http://creativecommons.org/licenses/by/4.0/ This work is licensed under a Creative Commons Attribution 4.0 International License. The images or other third party material in this article are included in the article’s Creative Commons license, unless indicated otherwise in the credit line; if the material is not included under the Creative Commons license, users will need to obtain permission from the license holder to reproduce the material. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/ |
spellingShingle | Article Song, Ting-Ting Qin, Su-Juan Wen, Qiao-Yan Wang, Yu-Kun Jia, Heng-Yue Finite-key security analyses on passive decoy-state QKD protocols with different unstable sources |
title | Finite-key security analyses on passive decoy-state QKD protocols with different unstable sources |
title_full | Finite-key security analyses on passive decoy-state QKD protocols with different unstable sources |
title_fullStr | Finite-key security analyses on passive decoy-state QKD protocols with different unstable sources |
title_full_unstemmed | Finite-key security analyses on passive decoy-state QKD protocols with different unstable sources |
title_short | Finite-key security analyses on passive decoy-state QKD protocols with different unstable sources |
title_sort | finite-key security analyses on passive decoy-state qkd protocols with different unstable sources |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4607920/ https://www.ncbi.nlm.nih.gov/pubmed/26471947 http://dx.doi.org/10.1038/srep15276 |
work_keys_str_mv | AT songtingting finitekeysecurityanalysesonpassivedecoystateqkdprotocolswithdifferentunstablesources AT qinsujuan finitekeysecurityanalysesonpassivedecoystateqkdprotocolswithdifferentunstablesources AT wenqiaoyan finitekeysecurityanalysesonpassivedecoystateqkdprotocolswithdifferentunstablesources AT wangyukun finitekeysecurityanalysesonpassivedecoystateqkdprotocolswithdifferentunstablesources AT jiahengyue finitekeysecurityanalysesonpassivedecoystateqkdprotocolswithdifferentunstablesources |