RESUMEN
We have developed a simple time-bin phase encoding quantum key distribution system, using the optical injection locking technique. This setup incorporates both the merits of simplicity and stability in encoding, and immunity to channel disturbance. We have demonstrated the field implementation of quantum key distribution over long-distance deployed aerial fiber automatically. During the 70-day field test, we achieved approximately a 1.0 kbps secure key rate with stable performance. Our work takes an important step toward widespread implementation of QKD systems in diverse and complex real-life scenarios.
RESUMEN
In this work, we present a new time-bin phase-encoding quantum key distribution (QKD), where the transmitter utilizes an inherently stable Sagnac-type interferometer, and has comparable electrical requirements to existing polarization or phase encoding schemes. This approach does not require intensity calibration and is insensitive to environmental disturbances, making it both flexible and high-performing. We conducted experiments with a compact QKD system to demonstrate the stability and secure key rate performance of the presented scheme. The results show a typical secure key rate of 6.2 kbps@20â dB and 0.4 kbps@30â dB with channel loss emulated by variable optical attenuators. A continuous test of 120-km fiber spool shows a stable quantum bit error rate of the time-bin basis within 0.4%â¼0.6% over a consecutive 9-day period without any adjustment. This intrinsically stable and compatible scheme of time-bin phase encoding is extensively applicable in various QKD experiments, including BB84 and measurement-device-independent QKD.
RESUMEN
Quantum key distribution (QKD) has attracted much attention due to its unconditional security. High-dimensional quantum key distribution (HD-QKD) is a brand-new type of QKD protocol that has many excellent advantages. Nonetheless, practical imperfections in realistic devices that are not considered in the theoretical security proof may have an impact on the practical security of realistic HD-QKD systems. In this paper, we research the influence of a realistic intensity modulator on the practical security of HD-QKD systems with the decoy-state method and finite-key effects. We demonstrate that there is a certain impact in the secret key rate and the transmission distance when taking practical factors into security analysis.
RESUMEN
Twin-field quantum key distribution (TF-QKD) has attracted considerable attention and developed rapidly due to its ability to surpass the fundamental rate-distance limit of QKD. However, the device imperfections may compromise its practical implementations. The goal of this paper is to make it robust against the state preparation flaws (SPFs) and side channels at the light source. We adopt the sending or not-sending (SNS) TF-QKD protocol to accommodate the SPFs and multiple optical modes in the emitted states. We analyze that the flaws of the phase modulation can be overcome by regarding the deviation of the phase as phase noise and eliminating it with the post-selection of phase. To overcome the side channels, we extend the generalized loss-tolerant (GLT) method to the four-intensity decoy-state SNS protocol. Remarkably, by decomposing of the two-mode single-photon states, the phase error rate can be estimated with only four parameters. The practical security of the SNS protocol with flawed and leaky source can be guaranteed. Our results might constitute a crucial step towards guaranteeing the practical implementation of the SNS protocol.
RESUMEN
The device-independent (DI) quantum key distribution (QKD) protocol requires minimal assumptions about the devices and its security relies on the violation of Bell inequalities, making it hard to realize in real world. Semi-device-independent (SDI) QKD protocol confines quantum state within finite dimensional Hilbert space, thus easier for implementation with existing experimental technology. In this paper, we propose a practical SDI prepare-and-measure BB84 protocol. By introducing min entropy for security proof, we obtain a security bound under the practical condition with finite resources. Numerical simulations imply the finite-key effect can not be ignored in the forthcoming SDI QKD experiment.
RESUMEN
Recently, a novel protocol named round-robin differential phase-shift (RRDPS) quantum key distribution [Nature 509, 475(2014)] has been proposed. It can estimate information leakage without monitoring bit error rate. In this paper, we study the performance of RRDPS using heralded single photon source (HSPS) without and with decoy-state method, then compare it with the performance of weak coherent pulses (WCPs). From numerical simulation, we can see that HSPS performs better especially for shorter packet and higher bit error rate. Moreover, we propose a general theory of decoy-state method for RRDPS protocol based on only three decoy states and one signal state. Taking WCPs as an example, the three-intensity decoy-state protocol can distribute secret keys over a distance of 128 km when the length of pulses packet is 32, which confirms great practical interest of our method.
RESUMEN
This corrects the article DOI: 10.1038/srep04759.
RESUMEN
Quantum key distribution (QKD) provides means for unconditional secure key transmission between two distant parties. However, in practical implementations, it suffers from quantum hacking due to device imperfections. Here we propose a hybrid measurement attack, with only linear optics, homodyne detection, and single photon detection, to the widely used vacuum + weak decoy state QKD system when the phase of source is partially randomized. Our analysis shows that, in some parameter regimes, the proposed attack would result in an entanglement breaking channel but still be able to trick the legitimate users to believe they have transmitted secure keys. That is, the eavesdropper is able to steal all the key information without discovered by the users. Thus, our proposal reveals that partial phase randomization is not sufficient to guarantee the security of phase-encoding QKD systems with weak coherent states.