Security of the Decoy State Two-Way Quantum Key Distribution with Finite Resources
-
Abstract
The quantum key distribution (QKD) allows two parties to share a secret key by typically making use of a one-way quantum channel. However, the two-way QKD has its own unique advantages, which means the two-way QKD has become a focus recently. To improve the practical performance of the two-way QKD, we present a security analysis of a two-way QKD protocol based on the decoy method with heralded single-photon sources (HSPSs). We make use of two approaches to calculate the yield and the quantum bit error rate of single-photon and two-photon pulses. Then we present the secret key generation rate based on the GLLP formula. The numerical simulation shows that the protocol with HSPSs has an advantage in the secure distance compared with weak coherent state sources. In addition, we present the final secret key generation rate of the LM05 protocol with finite resources by considering the statistical fluctuation of the yield and the error rate.
Article Text
-
-
-
About This Article
Cite this article:
Ya-Bin Gu, Wan-Su Bao, Yang Wang, Chun Zhou. Security of the Decoy State Two-Way Quantum Key Distribution with Finite Resources[J]. Chin. Phys. Lett., 2016, 33(4): 040301. DOI: 10.1088/0256-307X/33/4/040301
Ya-Bin Gu, Wan-Su Bao, Yang Wang, Chun Zhou. Security of the Decoy State Two-Way Quantum Key Distribution with Finite Resources[J]. Chin. Phys. Lett., 2016, 33(4): 040301. DOI: 10.1088/0256-307X/33/4/040301
|
Ya-Bin Gu, Wan-Su Bao, Yang Wang, Chun Zhou. Security of the Decoy State Two-Way Quantum Key Distribution with Finite Resources[J]. Chin. Phys. Lett., 2016, 33(4): 040301. DOI: 10.1088/0256-307X/33/4/040301
Ya-Bin Gu, Wan-Su Bao, Yang Wang, Chun Zhou. Security of the Decoy State Two-Way Quantum Key Distribution with Finite Resources[J]. Chin. Phys. Lett., 2016, 33(4): 040301. DOI: 10.1088/0256-307X/33/4/040301
|