Security of the Decoy State Two-Way Quantum Key Distribution with Finite Resources
Ya-Bin Gu1,2, Wan-Su Bao1,2**, Yang Wang1,2, Chun Zhou1,2
1Zhengzhou Information Science and Technology Institute, Zhengzhou 450004 2Synergetic Innovation Center of Quantum Information and Quantum Physics, University of Science and Technology of China, Hefei 230026
The quantum key distribution (QKD) allows two parties to share a secret key by typically making use of a one-way quantum channel. However, the two-way QKD has its own unique advantages, which means the two-way QKD has become a focus recently. To improve the practical performance of the two-way QKD, we present a security analysis of a two-way QKD protocol based on the decoy method with heralded single-photon sources (HSPSs). We make use of two approaches to calculate the yield and the quantum bit error rate of single-photon and two-photon pulses. Then we present the secret key generation rate based on the GLLP formula. The numerical simulation shows that the protocol with HSPSs has an advantage in the secure distance compared with weak coherent state sources. In addition, we present the final secret key generation rate of the LM05 protocol with finite resources by considering the statistical fluctuation of the yield and the error rate.
. [J]. 中国物理快报, 2016, 33(04): 40301-040301.
Ya-Bin Gu, Wan-Su Bao, Yang Wang, Chun Zhou. Security of the Decoy State Two-Way Quantum Key Distribution with Finite Resources. Chin. Phys. Lett., 2016, 33(04): 40301-040301.