999精品在线视频,手机成人午夜在线视频,久久不卡国产精品无码,中日无码在线观看,成人av手机在线观看,日韩精品亚洲一区中文字幕,亚洲av无码人妻,四虎国产在线观看 ?

Practical decoy-state BB84 quantum key distribution with quantum memory?

2021-06-26 03:03:16XianKeLi李咸柯XiaoQianSong宋小謙QiWeiGuo郭其偉XingYuZhou周星宇andQinWang王琴
Chinese Physics B 2021年6期

Xian-Ke Li(李咸柯) Xiao-Qian Song(宋小謙) Qi-Wei Guo(郭其偉)Xing-Yu Zhou(周星宇) and Qin Wang(王琴)

1Institute of Quantum Information and Technology,Nanjing University of Posts and Telecommunications,Nanjing 210003,China

2Broadband Wireless Communication and Sensor Network Technology,Key Laboratory of Ministry of Education,Nanjing University of Posts and Telecommunications,Nanjing 210003,China

3Telecommunication and Networks National Engineering Research Center,Nanjing University of Posts and Telecommunications,Nanjing 210003,China

Keywords: quantum key distribution,quantum communication,quantum memory,decoy state

1. Introduction

Quantum key distribution (QKD)[1]can generate secure keys between two distant users (usually named as Alice and Bob), despite the presence of an eavesdropper (Eve), which has made remarkable progress since 1984.[2–6]Generally,the performance of QKD deteriorates with the increase of transmission distance. To improve the performance of QKD,quantum memory(QM)which has capability of receiving,storing,and retrieving photons,can be applied in QKD systems.[7]

Despite the technology of QM is not mature yet, the characteristics of QM have been greatly improved, such as long storage times,[8,9]high fidelities,[10–12]and high storage efficiencies.[13]More importantly, QM can work at room temperature,[14–16]which makes it more applicable than before. Recently, works on QKD with QM have been reported.[7,17]The authors in Ref.[7]adopted heralded QMs to enhance the performance of measurement-device-independent QKD(MDI-QKD),[18]while the authors in Ref.[17]utilized a portable QM to realize free-space QKD.

In this paper, we investigate the performance of BB84 QKD with a heralded QM, which does not need entanglement sources and can work with the widely used weak coherent sources (WCS). In order to combat the photon number splitting attacks[19,20]caused by multi-photons in WCS,the decoy-state method[21–24]is applied in our scheme. With practical experimental parameters,we demonstrate that decoystate BB84 QKD with QM can exhibit performance better than that of without QM especially in long distance range.

2. Theory and security analysis of BB84 QKD with QM

The QM can be used to receive, store and retrieve photons. According to Ref.[25],we denote the writing efficiency asηin, which is the probability that the pulse sent by Alice is stored in the QM.Alice and Bob know whether the pulse is stored or not,because the QM is supposed to send out a heralding signal when a photon state is successfully stored.[26–28]ηoutrepresents retrieving probability of a pulse from the QM.

In our scheme (Fig. 1), Alice sends a sequence of encoded BB84 states to Bob. At Bob’s side, the QM stores Alice’s pulses with probabilityηin, and reads out the stored pulses with probabilityηout. In the present quantum key distribution systems,in order to reduce the dark count rate,Bob’s single-photon detectors usually work with a gating mode,i.e.,they only open when there is triggering signal. Usually Bob’s single-photon detectors are triggered by the synchronization signal of laser pulses,i.e.,the gating repetition rate is the same as the laser. Considering the heralding characteristic of the QM, Bob can discard those recording events without being heralded,i.e.,the photon pulses are not successfully stored in QM,resulting in substantially reduced dark count rate at Bob’s side.

Fig.1. Scheme of BB84 QKD with a heralded QM.EM:encoding module;DM:detection module.

Letηbdenote the transmittance in Bob’s side, which includes the internal transmittance of optical components and detector efficiency. Andηbcan be boiled down to the channel transmittance.[29]Hence, the overall transmittance between Alice and Bob,η,can be expressed as

whereαdenotes the channel loss coefficient,andLis the fiber length.

In the framework of BB84 QKD with QM,ηn|mrepresents the transmittance of ann-photon state given that Alice sends anm-photon state before QM.Yn|mandη'n|mrespectively represent the yield and transmittance at Bob’s side given that the QM successfully stores and retrieves ann-photon state when Alice sends anm-photon state. AndYn|mmainly comes from two parts,one coming from the detector dark count rate,the other from the detection of true signal. The combination gives

whereY0n|mrepresents the conditional probability of a detection event at Bob’s side given that the QM successfully stores ann-photon state but fails to retrieve it when Alice sends anm-photon state,i.e.,

Note that, due to the assumption that the QM is heralded,there will be no heralding signal if the QM stores no photons.Hence,we havem ≥n >0 in Eqs.(2)–(5).

According to Eqs.(2)–(4)and Ref.[24],we have the error rateen|m

whereedis the probability that a photon hits a wrong detector,ande0is the error rate of the background.

Combining Eqs.(1)–(6), the corresponding average gainQξand the average quantum bit error rate(QBER)EξQξcan be expressed as

Below let us give brief security analysis for our scheme according to information theory,[30]the lower bound of secure key rate of QKD system is equal to the mutual information between Alice and BobI(A:B) minus the mutual information between Eve and Bob(Alice)I(B:E)(I(A:E)),that is

Considering that the error correction efficiencyfis slightly bigger than one, andQ1|1=Y1|1Pξ1, this formula can be modified as

From the above security analysis, we now obtain the lower bound of secure key rate for the asymptotic case.

3. The three-intensity decoy-state BB84 protocol with QM

To implement the scheme of BB84 QKD with a heralded QM, we employ the three-intensity decoy-state method,[24]where Alice randomly modulates the WCS pulses into three different intensitiesu,v,and 0(u >v >0).

Similar to Eq.(7),the gains of these two decoy states are given by

When anym ≥2, them-photon probability of WCS satisfies

4. Numerical simulations

In practical QKD systems, statistical fluctuations have to be considered. Here for simplicity, we assume the channel fluctuation satisfies a Gaussian distribution, and we adopt the Gaussian analysis method to estimate the channel parameters.[32]Here the number of standard deviations in Gaussian approximation analysis method is reasonably set as 6.4, corresponding to a failure probability of 10?10. We simulate all results in this section based on the experimental parameters listed in Table 1.

Table 1. Simulation parameters for decoy-state BB84 QKD with and without the heralded QM.

First, considering differentηinandηout, we investigate the performance of decoy-state BB84 QKD with the heralded QM. For comparison purpose, we also investigate the performance of decoy-state BB84 QKD without QM. Here for simplicity, we assumeηinandηoutwith the same value,i.e.,ηQM=ηin=ηout. Moreover, considering the storage efficiency of the state-of-art quantum memory can reached 92%,[9]we reasonable setηQM= 1,0.8,0.5 in our simulations, corresponding simulation results are shown in Fig. 2.As shown in Fig.2,with reasonableηQM<1,[9,33]the performance of BB84 with QM is slightly worse than that of without QM in short distance range; However, due to the heralding feature of QM,which can reduce the valid dark count rate of Bob’s single photon detectors,the performance of BB84 QKD with QM is obviously better than that of BB84 without QM in long distance range.

Fig.2. Comparison between decoy-state BB84 QKD with and without QM.

Then, we study the effect of statistical fluctuations on decoy-state BB84 QKD with and without QM, and corresponding results are shown in Fig.3. From Fig.3,we can see that the performance of BB84 with and without QM degrades with the decrease of the total number of pulsesN. However,due to the reduce of valid dark count rate by QM,the performance of BB84 with QM is still better than that of without QM.

Fig.3. Statistical fluctuations on decoy-state BB84 QKD without QM and with QM.Here,we reasonably set ηQM as 0.8.

5. Conclusion

In conclusion, we have investigated the performance of decoy-state BB84 QKD with a heralded QM.Due to the mitigation of the valid dark counts of Bob’s single photon detectors, the transmission distance of decoy-state BB84 QKD can be greatly extended,which shows the feasibility of adopting QM in practical QKD systems. Furthermore, our present method can also be extended to the measurement-deviceindependent quantum key distribution (MDI-QKD) protocol,and it could show even more interesting characteristics. We believe our work will provide a valuable reference for researchers both in QKD and QM.

Acknowledgment

We thank Dr.Chun-Mei Zhang and Mr.Chen-Chen Mao for useful discussions.

主站蜘蛛池模板: 青草视频免费在线观看| 污网站免费在线观看| v天堂中文在线| 亚洲浓毛av| 国产视频久久久久| 亚洲一区二区日韩欧美gif| 岛国精品一区免费视频在线观看| 久久午夜影院| 中文字幕中文字字幕码一二区| 91视频首页| 国产成人精品18| 99热国产这里只有精品9九| 成人国产三级在线播放| 久久人搡人人玩人妻精品一| 国产又粗又爽视频| 亚洲欧美日本国产综合在线| 国产欧美日韩在线在线不卡视频| 狠狠躁天天躁夜夜躁婷婷| 免费毛片在线| 真人免费一级毛片一区二区| 日本在线视频免费| 亚洲天堂网在线视频| 色香蕉影院| 最新亚洲人成网站在线观看| 日韩AV无码一区| 熟女成人国产精品视频| 三上悠亚在线精品二区| 五月婷婷综合在线视频| 国产黄视频网站| 99九九成人免费视频精品| 99久久国产自偷自偷免费一区| 青草视频网站在线观看| 在线a视频免费观看| 久久99精品国产麻豆宅宅| 成人免费视频一区| 免费无码AV片在线观看中文| 久久黄色视频影| 青青久久91| 久久www视频| 91系列在线观看| 国产第四页| 天天色天天综合网| 欧美午夜理伦三级在线观看| 久久久精品久久久久三级| 国内精自视频品线一二区| 高清视频一区| 毛片卡一卡二| 无码丝袜人妻| 免费毛片网站在线观看| 美女免费精品高清毛片在线视| 免费观看无遮挡www的小视频| 国产精品va免费视频| 中文精品久久久久国产网址| 熟妇丰满人妻| 中文字幕资源站| 国产精品视频3p| 亚洲中文字幕23页在线| 国产真实自在自线免费精品| 国产精品永久免费嫩草研究院| 992Tv视频国产精品| 日本欧美中文字幕精品亚洲| 香蕉99国内自产自拍视频| 免费jizz在线播放| 久久综合九九亚洲一区| 欧美在线综合视频| 久久夜色精品国产嚕嚕亚洲av| 午夜精品一区二区蜜桃| 国产sm重味一区二区三区| 操操操综合网| 日韩视频精品在线| 毛片国产精品完整版| 在线精品亚洲一区二区古装| 亚洲欧美日韩色图| 亚洲一级毛片| 五月婷婷中文字幕| 无码一区18禁| 婷婷六月激情综合一区| 亚洲一区二区约美女探花| 亚洲中文字幕久久无码精品A| 国产成人一区在线播放| 无码aaa视频| 国产一区二区三区在线观看视频 |