Cargando…

Finite-key security analyses on passive decoy-state QKD protocols with different unstable sources

In quantum communication, passive decoy-state QKD protocols can eliminate many side channels, but the protocols without any finite-key analyses are not suitable for in practice. The finite-key securities of passive decoy-state (PDS) QKD protocols with two different unstable sources, type-II parametr...

Descripción completa

Detalles Bibliográficos
Autores principales: Song, Ting-Ting, Qin, Su-Juan, Wen, Qiao-Yan, Wang, Yu-Kun, Jia, Heng-Yue
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Nature Publishing Group 2015
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4607920/
https://www.ncbi.nlm.nih.gov/pubmed/26471947
http://dx.doi.org/10.1038/srep15276
_version_ 1782395574748708864
author Song, Ting-Ting
Qin, Su-Juan
Wen, Qiao-Yan
Wang, Yu-Kun
Jia, Heng-Yue
author_facet Song, Ting-Ting
Qin, Su-Juan
Wen, Qiao-Yan
Wang, Yu-Kun
Jia, Heng-Yue
author_sort Song, Ting-Ting
collection PubMed
description In quantum communication, passive decoy-state QKD protocols can eliminate many side channels, but the protocols without any finite-key analyses are not suitable for in practice. The finite-key securities of passive decoy-state (PDS) QKD protocols with two different unstable sources, type-II parametric down-convention (PDC) and phase randomized weak coherent pulses (WCPs), are analyzed in our paper. According to the PDS QKD protocols, we establish an optimizing programming respectively and obtain the lower bounds of finite-key rates. Under some reasonable values of quantum setup parameters, the lower bounds of finite-key rates are simulated. The simulation results show that at different transmission distances, the affections of different fluctuations on key rates are different. Moreover, the PDS QKD protocol with an unstable PDC source can resist more intensity fluctuations and more statistical fluctuation.
format Online
Article
Text
id pubmed-4607920
institution National Center for Biotechnology Information
language English
publishDate 2015
publisher Nature Publishing Group
record_format MEDLINE/PubMed
spelling pubmed-46079202015-10-28 Finite-key security analyses on passive decoy-state QKD protocols with different unstable sources Song, Ting-Ting Qin, Su-Juan Wen, Qiao-Yan Wang, Yu-Kun Jia, Heng-Yue Sci Rep Article In quantum communication, passive decoy-state QKD protocols can eliminate many side channels, but the protocols without any finite-key analyses are not suitable for in practice. The finite-key securities of passive decoy-state (PDS) QKD protocols with two different unstable sources, type-II parametric down-convention (PDC) and phase randomized weak coherent pulses (WCPs), are analyzed in our paper. According to the PDS QKD protocols, we establish an optimizing programming respectively and obtain the lower bounds of finite-key rates. Under some reasonable values of quantum setup parameters, the lower bounds of finite-key rates are simulated. The simulation results show that at different transmission distances, the affections of different fluctuations on key rates are different. Moreover, the PDS QKD protocol with an unstable PDC source can resist more intensity fluctuations and more statistical fluctuation. Nature Publishing Group 2015-10-16 /pmc/articles/PMC4607920/ /pubmed/26471947 http://dx.doi.org/10.1038/srep15276 Text en Copyright © 2015, Macmillan Publishers Limited http://creativecommons.org/licenses/by/4.0/ This work is licensed under a Creative Commons Attribution 4.0 International License. The images or other third party material in this article are included in the article’s Creative Commons license, unless indicated otherwise in the credit line; if the material is not included under the Creative Commons license, users will need to obtain permission from the license holder to reproduce the material. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/
spellingShingle Article
Song, Ting-Ting
Qin, Su-Juan
Wen, Qiao-Yan
Wang, Yu-Kun
Jia, Heng-Yue
Finite-key security analyses on passive decoy-state QKD protocols with different unstable sources
title Finite-key security analyses on passive decoy-state QKD protocols with different unstable sources
title_full Finite-key security analyses on passive decoy-state QKD protocols with different unstable sources
title_fullStr Finite-key security analyses on passive decoy-state QKD protocols with different unstable sources
title_full_unstemmed Finite-key security analyses on passive decoy-state QKD protocols with different unstable sources
title_short Finite-key security analyses on passive decoy-state QKD protocols with different unstable sources
title_sort finite-key security analyses on passive decoy-state qkd protocols with different unstable sources
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4607920/
https://www.ncbi.nlm.nih.gov/pubmed/26471947
http://dx.doi.org/10.1038/srep15276
work_keys_str_mv AT songtingting finitekeysecurityanalysesonpassivedecoystateqkdprotocolswithdifferentunstablesources
AT qinsujuan finitekeysecurityanalysesonpassivedecoystateqkdprotocolswithdifferentunstablesources
AT wenqiaoyan finitekeysecurityanalysesonpassivedecoystateqkdprotocolswithdifferentunstablesources
AT wangyukun finitekeysecurityanalysesonpassivedecoystateqkdprotocolswithdifferentunstablesources
AT jiahengyue finitekeysecurityanalysesonpassivedecoystateqkdprotocolswithdifferentunstablesources