4.6 Article

Security bounds for decoy-state quantum key distribution with arbitrary photon-number statistics

期刊

PHYSICAL REVIEW A
卷 105, 期 1, 页码 -

出版社

AMER PHYSICAL SOC
DOI: 10.1103/PhysRevA.105.012603

关键词

-

资金

  1. MIUR (Italian Minister for Education) under the initiative Departments of Excellence
  2. ASI (Italian Space Agency) [2019-5-U.0, CUP F44118000040001, 2018-14-HH.0, CUP: E16J16001490001]

向作者/读者索取更多资源

The decoy-state method is a standard enhancement to quantum key distribution protocols, but its theoretical foundation needs further study for new technological advancements. This work provides security bounds for decoy-state QKD using a source with an arbitrary photon emission statistic. The performance of the bounds is evaluated with three statistical distributions - Poisson, thermal, and binomial, showing that they are all viable options for QKD.
The decoy-state method is a standard enhancement to quantum key distribution (QKD) protocols that has enabled countless QKD experiments with inexpensive light sources. However, new technological advancements might require further theoretical study of this technique. In particular, the decoy-state method is typically described under the assumption of a Poisson statistical distribution for the number of photons in each QKD pulse. This is a practical choice, because prepare-and-measure QKD is often implemented with attenuated lasers, which produce exactly this distribution. However, sources that do not meet this assumption are not guaranteed to be compatible with decoy states. In this work, we provide security bounds for decoy-state QKD using a source with an arbitrary photon emission statistic. We consider both the asymptotic limit of infinite key and the finite-size scenario, and evaluate two common decoy-state schemes: the vacuum + weak and one-decoy protocols. We numerically evaluate the performance of the bounds, comparing three realistic statistical distributions (Poisson, thermal, and binomial), showing that they are all viable options for QKD.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据