| Literature DB >> 27443610 |
Abstract
The security of quantum key distribution (QKD) is established by a security proof, and the security proof puts some assumptions on the devices consisting of a QKD system. Among such assumptions, security proofs of the six-state protocol assume the use of photon number resolving (PNR) detector, and as a result the bit error rate threshold for secure key generation for the six-state protocol is higher than that for the BB84 protocol. Unfortunately, however, this type of detector is demanding in terms of technological level compared to the standard threshold detector, and removing the necessity of such a detector enhances the feasibility of the implementation of the six-state protocol. Here, we develop the security proof for the six-state protocol and show that we can use the threshold detector for the six-state protocol. Importantly, the bit error rate threshold for the key generation for the six-state protocol (12.611%) remains almost the same as the one (12.619%) that is derived from the existing security proofs assuming the use of PNR detectors. This clearly demonstrates feasibility of the six-state protocol with practical devices.Entities:
Year: 2016 PMID: 27443610 PMCID: PMC4957092 DOI: 10.1038/srep30044
Source DB: PubMed Journal: Sci Rep ISSN: 2045-2322 Impact factor: 4.379
Figure 1Plot of H(Z|X)(1,2) (dashed line), h(eb) (dotted line), 1 − h(eb) (dot-dashed line), and a tangent (solid line) whose tangent point (B = (0.12619.., 0.54690..)) is the intersection of 1 − h(eb) and H(Z|X)(1,2).
We can neglect any point in the gray-filled regime in the maximization of .
Figure 2Fig. 1 without the tangent and the one with (e, H(Z|X)(3)) that takes values in the shadow regime.
for is H(Z|X)(1,2) (dashed line) and the solid line represents for . We can obtain after taking the convex combination of H(Z|X)(1,2) (dashed line) and a point in the shadow regime. Note that as a result of taking the convex combination, the tangent of the dashed line whose tangent point is B slightly tilts up, moving the tangent point from B to D = (0.115 …, 0.42407 …). This leads to the slight degradation in the bit error rate threshold.