4.6 Article

Generation of Decoy Signals Using Optical Amplifiers for a Plug-and-Play Quantum Key Distribution System

Journal

APPLIED SCIENCES-BASEL
Volume 12, Issue 13, Pages -

Publisher

MDPI
DOI: 10.3390/app12136491

Keywords

plug-and-play quantum key distribution; decoy-state protocol; quantum optics; quantum communication; QKD; information security

Funding

  1. National Research Foundation of Korea [2019M3E4A1079777, 2021M1A2A2043892]
  2. Institute for Information and Communications Technology Promotion [2020-0-00972, 2020-0-00947]
  3. Korea Institute of Science and Technology [2E31531]
  4. National Research Foundation of Korea [2021M1A2A2043892] Funding Source: Korea Institute of Science & Technology Information (KISTI), National Science & Technology Information Service (NTIS)

Ask authors/readers for more resources

In this study, a method for generating decoy pulses through amplification using an optical amplifier is proposed. It solves the technical issues in the plug-and-play architecture and is not limited by the input signal polarization. By adding a circulator to adjust the signal intensity, the system can operate stably and defend against Trojan horse attacks.
In most quantum key distribution (QKD) systems, a decoy-state protocol is implemented for preventing potential quantum attacks and higher mean photon rates. An optical intensity modulator attenuating the signal intensity is used to implement it in a QKD system adopting a one-way architecture. However, in the case of the plug-and-play (or two-way) architecture, there are technical issues, including random polarization of the input signal pulse and long-term stability. In this study, we propose a method for generating decoy pulses through amplification using an optical amplifier. The proposed scheme operates regardless of the input signal polarization. In addition, a circulator was added to adjust the signal intensity when the signal enters the input and exits the QKD transmitter by monitoring the intensity of the output signal pulse. It also helps to defend against Trojan horse attacks. A test setup for the proof-of-principle experiment was implemented and tested, and it was shown that the system operated stably with a quantum bit error rate (QBER) value of less than 5% over 26 h using a quantum channel (QC) of 25 km.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available