Decoy-pulse Protocol for Frequency-coded Quantum Key Distribution
Authors: Sudeshna Bhattacharya, Pratyush Pandey, Pradeep Kumar K
Abstract:
We propose a decoy-pulse protocol for frequency-coded implementation of B92 quantum key distribution protocol. A direct extension of decoy-pulse method to frequency-coding scheme results in security loss as an eavesdropper can distinguish between signal and decoy pulses by measuring the carrier photon number without affecting other statistics. We overcome this problem by optimizing the ratio of carrier photon number of decoy-to-signal pulse to be as close to unity as possible. In our method the switching between signal and decoy pulses is achieved by changing the amplitude of RF signal as opposed to modulating the intensity of optical signal thus reducing system cost. We find an improvement by a factor of 100 approximately in the key generation rate using decoy-state protocol. We also study the effect of source fluctuation on key rate. Our simulation results show a key generation rate of 1.5×10-4/pulse for link lengths up to 70km. Finally, we discuss the optimum value of average photon number of signal pulse for a given key rate while also optimizing the carrier ratio.
Keywords: B92, decoy-pulse, frequency-coding, quantum key distribution.
Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1073391
Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1729References:
[1] W. Y. Hwang, "Quantum key distribution with high loss: Toward global secure communication," Phys. Rev. Lett., vol. 91, no. 057901, 2003.
[2] J. M. Merolla et al., "Phase-modulation transmission system for quantum cryptography," Opt. Lett., vol. 24, 1999.
[3] P. Kumar and A. Prabhakar, "Bit error rates in a frequency coded quantum key distribution system," Optics Communications, vol. 282, no. 18, pp. 3827-3833, 2009.
[4] X. Ma et al., "Practical decoy state for quantum key distribution," Physical Review A, vol. 72, no. 012326, 2005.
[5] Y. Zhao et al., "Simulation and implementation of decoy state quantum key distribution over 60 km telecom fiber," in Proceedings of IEEE International Symposium on Information Theory, 2006, pp. 2094-2098.
[6] D. Gottesman et al., "Security of quantum key distribution with imperfect devices," Quantum Information and Computation, vol. 4, p. 325, 2004.
[7] G. Brassard and L. Salvail, "Advances in cryptology eurocrypt-93," Lecture Notes in Computer Science, vol. 765, pp. 410-423, 1994.
[8] J.-Z. Hu and X.-B. Wang, "Reexamination of the decoy-state quantum key distribution with an unstable source," Phys. Rev. A, vol. 82, p. 012331, 2010.