| Literature DB >> 30816159 |
Zong-Wen Yu1,2, Xiao-Long Hu1, Cong Jiang1, Hai Xu1, Xiang-Bin Wang3,4,5,6.
Abstract
Recently, the twin field quantum key distribution (TF-QKD) protocols have been investigated extensively. In particular, an efficient protocol for TF-QKD with sending or not sending the coherent state has been given in. Here in this paper, we present results of practical sending-or-not-sending (SNS) twin field quantum key distribution. In real-life implementations, we need consider the following three requirements, a few different intensities rather than infinite number of different intensities, a phase slice of appropriate size rather than infinitely small size and the statistical fluctuations. We first show the decoy-state method with only a few different intensities and a phase slice of appropriate size. We then give a statistical fluctuation analysis for the decoy-state method. Numerical simulation shows that, the performance of our method is comparable to the asymptotic case for which the key size is large enough. Our method can beat the PLOB bound on secret key capacity. Our results show that practical implementations of the SNS quantum key distribution can be both secure and efficient.Entities:
Year: 2019 PMID: 30816159 PMCID: PMC6395628 DOI: 10.1038/s41598-019-39225-y
Source DB: PubMed Journal: Sci Rep ISSN: 2045-2322 Impact factor: 4.379
List of experimental parameters used in numerical simulations.
|
|
|
|
|
|
|---|---|---|---|---|
| 1.0 × 10−10 | 50% | 1.1 | 1.0 × 10−10 | 15% |
p: the dark count rate, η: the detection efficiency of all detectors, f: the error correction inefficiency, ε: the security bound considered in the statistical fluctuation analysis, e: the misalignment error.
Figure 1Optimal key rate (bits per pulse) as a function of the distance by 4-inensity decoy-state method. The asymptotic result is shown in the red solid line. The blue dotted line, the green dash-dot line and the black dashed line are the results with N = 1014, N = 1013 and N = 1012, respectively. The solid magenta thick line illustrates the PLOB bound.
Figure 2Optimal key rate (bits per pulse) as a function of the distance. The asymptotic result is shown in the red solid line. The blue dashed line and the green dash-dot line are the results for 4-intensity and 3-intensity decoy-state methods with N = 1012, respectively.
Figure 3Optimal value of Δ (radians) corresponding to the optimal key rate by 4-intensity decoy-state method with N = 1012.