ترغب بنشر مسار تعليمي؟ اضغط هنا

A passive transmitter for quantum key distribution with coherent light

173   0   0.0 ( 0 )
 نشر من قبل Marcos Curty
 تاريخ النشر 2011
  مجال البحث فيزياء
والبحث باللغة English




اسأل ChatGPT حول البحث

Signal state preparation in quantum key distribution schemes can be realized using either an active or a passive source. Passive sources might be valuable in some scenarios; for instance, in those experimental setups operating at high transmission rates, since no externally driven element is required. Typical passive transmitters involve parametric down-conversion. More recently, it has been shown that phase-randomized coherent pulses also allow passive generation of decoy states and Bennett-Brassard 1984 (BB84) polarization signals, though the combination of both setups in a single passive source is cumbersome. In this paper, we present a complete passive transmitter that prepares decoy-state BB84 signals using coherent light. Our method employs sum-frequency generation together with linear optical components and classical photodetectors. In the asymptotic limit of an infinite long experiment, the resulting secret key rate (per pulse) is comparable to the one delivered by an active decoy-state BB84 setup with an infinite number of decoy settings.

قيم البحث

اقرأ أيضاً

We present a silicon optical transmitter for polarization-encoded quantum key distribution (QKD). The chip was fabricated in a standard silicon photonic foundry process and integrated a pulse generator, intensity modulator, variable optical attenuato r, and polarization modulator in a 1.3 mm $times$ 3 mm die area. The devices in the photonic circuit meet the requirements for QKD. The transmitter was used in a proof-of-concept demonstration of the BB84 QKD protocol over a 5 km long fiber link.
Twin-Field quantum key distribution (TF-QKD) and its variants, e.g. Phase-Matching QKD, Sending-or-not-sending QKD, and No Phase Post-Selection TFQKD promise high key rates at long distance to beat the rate distance limit without a repeater. The secu rity proof of these protocols are based on decoy-state method, which is usually performed by actively modulating a variable optical attenuator together with a random number generator in practical experiments, however, active-decoy schemes like this may lead to side channel and could open a security loophole. To enhance the source security of TF-QKD, in this paper, we propose passive-decoy based TF-QKD, in which we combine TF-QKD with the passive-decoy method. And we present a simulation comparing the key generation rate with that in active-decoy, the result shows our scheme performs as good as active decoy TF-QKD, and our scheme could reach satisfactory secret key rates with just a few photon detectors. This shows our work is meaningful in practice.
Quantum key distribution (QKD), a technology that enables perfectly secure communication, has evolved to the stage where many different protocols are being used in real-world implementations. Each protocol has its own advantages, meaning that users c an choose the one best-suited to their application, however each often requires different hardware. This complicates multi-user networks, in which users may need multiple transmitters to communicate with one another. Here, we demonstrate a direct-modulation based transmitter that can be used to implement most weak coherent pulse based QKD protocols with simple changes to the driving signals. This also has the potential to extend to classical communications, providing a low chirp transmitter with simple driving requirements that combines phase shift keying with amplitude shift keying. We perform QKD with concurrent time-bin and phase modulation, alongside phase randomisation. The acquired data is used to evaluate secure key rates for time-bin encoded BB84 with decoy states and a finite key-size analysis, giving megabit per second secure key rates, 1.60 times higher than if purely phase-encoded BB84 was used.
In this paper we present finite-key security analysis for quantum key distribution protocol based on weak coherent (in particular phase-coded) states using a fully quantum asymptotic equipartition property technique. This work is the extension of the proof for non-orthogonal states on the coherent states. Below we consider two types of attacks each of them maximizes either Alice-Eve or Eve-Bob mutual information. The cornerstone of this paper is that we do assume the possibility of crucial intercept-resend attack based on errorless unambiguous state discrimination measurement. We demonstrate that Holevo bound always gives the highest mutual information between Alice and Eve regardless particular kind of isometry. As the main result we present the dependence of the extracted secret key length. As the example we implement the proposed analysis to the subcarrier wave quantum key distribution protocol.
The work by Christandl, Konig and Renner [Phys. Rev. Lett. 102, 020504 (2009)] provides in particular the possibility of studying unconditional security in the finite-key regime for all discrete-variable protocols. We spell out this bound from their general formalism. Then we apply it to the study of a recently proposed protocol [Laing et al., Phys. Rev. A 82, 012304 (2010)]. This protocol is meaningful when the alignment of Alices and Bobs reference frames is not monitored and may vary with time. In this scenario, the notion of asymptotic key rate has hardly any operational meaning, because if one waits too long time, the average correlations are smeared out and no security can be inferred. Therefore, finite-key analysis is necessary to find the maximal achievable secret key rate and the corresponding optimal number of signals.
التعليقات
جاري جلب التعليقات جاري جلب التعليقات
سجل دخول لتتمكن من متابعة معايير البحث التي قمت باختيارها
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا