Finite-key security analyses on passive decoy-state QKD protocols with different unstable sources

In quantum communication, passive decoy-state QKD protocols can eliminate many side channels, but the protocols without any finite-key analyses are not suitable for in practice. The finite-key securities of passive decoy-state (PDS) QKD protocols with two different unstable sources, type-II parametr...

Full description

Saved in:
Bibliographic Details
Published inScientific reports Vol. 5; no. 1; p. 15276
Main Authors Song, Ting-Ting, Qin, Su-Juan, Wen, Qiao-Yan, Wang, Yu-Kun, Jia, Heng-Yue
Format Journal Article
LanguageEnglish
Published England Nature Publishing Group 16.10.2015
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:In quantum communication, passive decoy-state QKD protocols can eliminate many side channels, but the protocols without any finite-key analyses are not suitable for in practice. The finite-key securities of passive decoy-state (PDS) QKD protocols with two different unstable sources, type-II parametric down-convention (PDC) and phase randomized weak coherent pulses (WCPs), are analyzed in our paper. According to the PDS QKD protocols, we establish an optimizing programming respectively and obtain the lower bounds of finite-key rates. Under some reasonable values of quantum setup parameters, the lower bounds of finite-key rates are simulated. The simulation results show that at different transmission distances, the affections of different fluctuations on key rates are different. Moreover, the PDS QKD protocol with an unstable PDC source can resist more intensity fluctuations and more statistical fluctuation.
Bibliography:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 23
ISSN:2045-2322
2045-2322
DOI:10.1038/srep15276