Decoy state
Decoy state quantum key distribution (QKD) protocol is the most widely implemented QKD scheme. Practical QKD systems use multi-photon sources, in contrast to the standard BB84 protocol, making them susceptible to photon number splitting (PNS) attacks. This would significantly limit the secure transmission rate or the maximum channel length in practical QKD systems. In decoy state technique, this fundamental weakness of practical QKD systems is addressed by using multiple intensity levels at the transmitter's source, i.e. qubits are transmitted by Alice using randomly chosen intensity levels (one signal state and several decoy states), resulting in varying photon number statistics throughout the channel. At the end of the transmission, Alice announces publicly, which intensity level has been used for the transmission of each qubit. A successful PNS attack requires maintaining the bit error rate (BER) at the receiver's end, which can not be accomplished with multiple photon number statistics. By monitoring BERs associated with each intensity level, the two legitimate parties will be able to detect a PNS attack, with highly increased secure transmission rates or maximum channel lengths, making QKD systems suitable for practical applications.
Origin
In QKD protocols, such as BB84, a single photon source is assumed to be used by the sender, Alice. In reality, a perfect single photon source does not exist. Instead, practical sources, such as weak coherent state laser source, are widely used for QKD. The key problem with these practical QKD sources is the multi-photon components which they contain. A serious security loophole exists when Alice uses multi-photon states as quantum information carriers. In order to minimize the effects of multi-photon states, Alice has to use an extremely weak laser source, which results in a relatively low speed of QKD. Decoy state QKD is proposed to solve this multi-photon issue by using a few different photon intensities instead of one. With decoy states, the practical sources, such as a coherent-state source or heralded parametric down-conversion (PDC) source, perform almost as well as a single photon source.
Security
The security of decoy state QKD has been proven by Lo, Ma and Chen.[1] In the security proof, a photon number channel model is proposed and an infinite number of decoy states are assumed to be prepared by Alice.
Practical schemes
Later, a practical decoy state QKD scheme with only two decoy states, vacuum+weak, is proposed.[2]
Experimental implementation
The (vacuum+weak) decoy state protocol was firstly experimentally demonstrated in Toronto.[3] This protocol is also demonstrated by a few groups throughout the world.[4][5][6][7][8]
Decoy-state QKD using non-coherent-state sources
Decoy state QKD protocols with non-coherent-state sources have also been analyzed. Passive decoy state protocol, where the decoy states are prepared passively, is proposed as a parametric down-conversion source.[9][10]
See also
- Quantum cryptography
- Quantum key distribution
- List of quantum key distribution protocols
- Quantum network
References
- ↑ Hoi-Kwong Lo, Xiongfeng Ma, and Kai Chen, "Decoy State Quantum Key Distribution", Physical Review Letters, 94, 230504 (2005)
- ↑ Xiongfeng Ma, Bing Qi, Yi Zhao, and Hoi-Kwong Lo, "Practical decoy state for quantum key distribution", Phys. Rev. A 72, 012326 (2005)
- ↑ Yi Zhao, Bing Qi, Xiongfeng Ma, Hoi-Kwong Lo, and Li Qian, "Experimental Quantum Key Distribution with Decoy States", Phys. Rev. Lett. 96, 070502 (2006)
- ↑ Danna Rosenberg et al., "Long-Distance Decoy-State Quantum Key Distribution in Optical Fiber", Phys. Rev. Lett. 98, 010503 (2007)
- ↑ Tobias Schmitt-Manderbach et al., "Experimental Demonstration of Free-Space Decoy-State Quantum Key Distribution over 144 km", Phys. Rev. Lett. 98, 010504 (2007)
- ↑ Cheng-Zhi Peng et al., "Experimental Long-Distance Decoy-State Quantum Key Distribution Based on Polarization Encoding", Phys. Rev. Lett. 98, 010505 (2007)
- ↑ Z. L. Yuan, A. W. Sharpe, and A. J. Shields, "Unconditionally secure one-way quantum key distribution using decoy pulses", Appl. Phys. Lett. 90, 011118 (2007)
- ↑ S. H. Shams Mousavi, P. Gallion, "Decoy-state quantum key distribution using homodyne detection", Phys. Rev. A 80, 012327 (2009)
- ↑ Yoritoshi Adachi, Takashi Yamamoto, Masato Koashi, and Nobuyuki Imoto, "Simple and Efficient Quantum Key Distribution with Parametric Down-Conversion", Phys. Rev. Lett. 99, 180503 (2007)
- ↑ Xiongfeng Ma and Hoi-Kwong Lo, "Quantum key distribution with triggering parametric down-conversion sources", New J. Phys. 10 073018 (2008)