ﻻ يوجد ملخص باللغة العربية
The phase randomized light is one of the key assumptions in the security proof of Bennett-Brassard 1984 (BB84) quantum key distribution (QKD) protocol implemented with an attenuated laser. Though the assumption has been believed to be satisfied for conventional systems, it should be reexamined for current high speed QKD systems. The phase correlation may be induced by the overlap of the optical pulses, the interval of which decreases as the clock frequency. The phase randomness was investigated experimentally by measuring the visibility of interference. An asymmetric Mach-Zehnder interferometer was used to observe the interference between adjacent pulses from a gain-switched distributed feedback laser diode driven at 10 GHz. Low visibility was observed when the minimum drive current was set far below the threshold, while the interference emerged when the minimum drive current was close to the threshold. Theoretical evaluation on the impact of the imperfect phase randomization provides target values for the visibility to guarantee the phase randomness. The experimental and theoretical results show that secure implementation of decoy BB84 protocol is achievable even for the 10-GHz clock frequency, by using the laser diode under proper operating conditions.
A commonly held tenet is that lasers well above threshold emit photons in a coherent state, which follow a Poissonian statistics when measured in photon number. This feature is often exploited to build quantum-based random number generators or to der
Decoy-state quantum key distribution (QKD) is a standard technique in current quantum cryptographic implementations. Unfortunately, existing experiments have two important drawbacks: the state preparation is assumed to be perfect without errors and t
Quantum key distribution (QKD) based on the laws of quantum physics allows the secure distribution of secret keys over an insecure channel. Unfortunately, imperfect implementations of QKD compromise its information-theoretical security. Measurement-d
Signal state preparation in quantum key distribution schemes can be realized using either an active or a passive source. Passive sources might be valuable in some scenarios; for instance, in those experimental setups operating at high transmission ra
Despite the enormous theoretical and experimental progress made so far in quantum key distribution (QKD), the security of most existing QKD implementations is not rigorously established yet. A critical obstacle is that almost all existing security pr