摘要The existing theory of decoy-state quantum cryptography assumes that the dark count rate is a constant, but in practice there exists fluctuation. We develop a new scheme of the decoy state, achieve a more practical key generation rate in the presence of fluctuation of the dark count rate, and compare the result with the result of the decoy-state without fluctuation. It is found that the key generation rate and maximal secure distance will be decreased under the influence of the fluctuation of the dark count rate.
Abstract:The existing theory of decoy-state quantum cryptography assumes that the dark count rate is a constant, but in practice there exists fluctuation. We develop a new scheme of the decoy state, achieve a more practical key generation rate in the presence of fluctuation of the dark count rate, and compare the result with the result of the decoy-state without fluctuation. It is found that the key generation rate and maximal secure distance will be decreased under the influence of the fluctuation of the dark count rate.
GAO Xiang;SUN Shi-Hai;LIANG Lin-Mei. General Theory of Decoy-State Quantum Cryptography with Dark Count Rate Fluctuation[J]. 中国物理快报, 2009, 26(10): 100307-100307.
GAO Xiang, SUN Shi-Hai, LIANG Lin-Mei. General Theory of Decoy-State Quantum Cryptography with Dark Count Rate Fluctuation. Chin. Phys. Lett., 2009, 26(10): 100307-100307.
[1] Brub D 1998 Phys. Rev. Lett. 81 3018 [2] Gisin N, Ribordy G, Tittel W and Zbinden H 2002 Rev.Mod. Phys. 74 145 [3] Dusek M, L\"{utkenhaus N and Hendrych M 2006 Progress in Optics ed Wolf E (New York: Elsevier) vol 6 p 381 [4] Inamori H, L\"{utkenhaus N and Mayers D 2007 Eur.Phys. J. D 41 599 [5] Huttner B, Gisin N, Mor T and Imoto N 1995 Phys.Rev. A 51 1863 [6] Lutkenhaus N and Jahma M 2002 New J. Phys. 444 [7] Brassard G, Lutkenhaus N, Mor T and Sanders B C 2000 Phys. Rev. Lett. 85 1330 [8] Hwang W Y 2003 Phys. Rev. Lett. 91 057901 [9] Wang X B, Hiroshima T, Tomita A and Hayashi M 2007 Phys. Rep. 1 448 [10] Lo H K, Ma X F and Chen K 2005 Phys. Rev. Lett. 94 230504 [11] Scarani V, Acin A, Ribordy G and Gisin N 2004 Phys.Rev. Lett. 92 057901 [12] Koashi M 2004 Phys. Rev. Lett. 93 120501 [13] Gottesman D, Lo H K, Lutkenhaus N and Preskill J 2004 Quantum Inform. Comput. 4 325 [14] Bennett C H and Brassard G 1984 Proceedings of theIEEE International Conference on Computers, Systems and SignalProcessing (New York: IEEE) p 175 [15] Zhao Y, Qi B, Ma X F, Lo H K and Qian L 2006 Phys.Rev. Lett. 96 070502 [16] Tobias S M, Weier H, Furst M, Ursin R, Tiefenbacher F,Scheidl T, Perdigues J, Sodnik Z, Kurtsiefer C, Rarity J G,Zeilinger A and Weinfurter H 2007 Phys. Rev. Lett. 98010504 [17] Peng C Z, Zhang J, Yang D, Gao W B, Ma H X, Yin H, Zeng HP, Yang T, Wang X B and Pan J W 2007 Phys. Rev. Lett. 98010505 [18] Rosenberg D, Harrington J W, Rice P R, Hiskett P A,Peterson C G, Hughes R J, Lita A E, Nam S W and Nordholt J E 2007 Phys. Rev. Lett. 98 010503 [19] Wang X B 2005 Phys. Rev. Lett. 94 230503 [20] Wang X B 2007 Phys. Rev. A 75 052301 [21] Wang X B, Peng C Z, Zhang J, Yang L and Pan J W 2008 Phys. Rev. A 77 042311 [22] Ma X F, Qi B, Zhao Y and Lo H K 2005 Phys. Rev. A 72 012326 [23] Gobby C, Yuan Z L and Shuelds A J 2004 Appl. Phys.Lett. 84 3762