Afterpulsing Effect on the Baseline System Error Rate and on the
Decoy-State Quantum Key Distribution Protocols
- URL: http://arxiv.org/abs/2010.03358v2
- Date: Thu, 22 Oct 2020 12:09:26 GMT
- Title: Afterpulsing Effect on the Baseline System Error Rate and on the
Decoy-State Quantum Key Distribution Protocols
- Authors: Christos Papapanos, Dimitris Zavitsanos, Giannis Giannoulis, Adam
Raptakis, Christos Kouloumentas, Hercules Avramopoulos
- Abstract summary: We develop a theoretical analysis of afterpulsing effect on the decoy-state QKD protocols for multiple detectors.
Results can be used as a guide for every practical decoy-state QKD protocol implementation in real-world deployments.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: There is considerable interest in predicting the efficiency of Quantum Key
Distribution (QKD) protocols when one of their implementation quantities is
modified. One significant imperfection that affects the efficiency of the setup
is the afterpulse phenomenon which consists in the spontaneous detections
triggered by trapped carriers after previous avalanches at the detectors. While
it is widely studied in bibliography for various QKD protocols, it has been
reported much more scarcely for the well-known decoy-state QKD protocols and
for dual detectors only. We develop a theoretical analysis of afterpulsing
effect on the decoy-state QKD protocols for multiple detectors, delivering
results which can be used as a guide for every practical decoy-state QKD
protocol implementation in real-world deployments. A new formula connecting the
baseline system error rate and the afterpulse probability is derived which may
hold for all protocols as it is consisted of only setup-related quantities.
Numerical simulations addressing the significance of breaking down the
quantities pertaining to the decoy-state QKD protocols are being made, focusing
on the weak+vacuum decoy-state QKD protocol as a characteristic subcase.
Related papers
- Device-independent quantum key distribution based on routed Bell tests [0.0]
We investigate DIQKD protocols based on a routed setup.
In these protocols, photons from the source are routed by an actively controlled switch to a nearby test device instead of the distant one.
We find that in an ideal case routed DIQKD protocols can significantly improve detection efficiency requirements, by up to $sim 30%$.
arXiv Detail & Related papers (2024-04-01T15:59:09Z) - Experimental implementation of distributed phase reference quantum key
distribution protocols [1.4513830934124623]
We have experimentally realized optical fiber based coherent one way and differential phase shift QKD protocols at telecom wavelength.
Both protocols belong to a class of protocols named as distributed phase reference protocol in which weak coherent pulses are used to encode the information.
arXiv Detail & Related papers (2023-12-30T05:29:26Z) - Precise Phase Error Rate Analysis for Quantum Key Distribution with
Phase Postselection [14.638851224694692]
Quantum key distribution (QKD) stands as a pioneering method for establishing information-theoretically secure communication channels.
Here we make a precise phase error rate analysis for QKD protocols with phase postselection.
We further apply our analysis in sending-or-not-sending twin-field quantum key distribution (SNS-TFQKD) and mode-pairing quantum key distribution (MP-QKD)
arXiv Detail & Related papers (2023-12-11T13:49:40Z) - Efficient Device-Independent Quantum Key Distribution [4.817429789586127]
Device-independent quantum key distribution (DIQKD) is a key distribution scheme whose security is based on the laws of quantum physics.
We propose an efficient device-independent quantum key distribution protocol in which one participant prepares states and transmits them to another participant.
arXiv Detail & Related papers (2023-11-16T13:01:34Z) - QKD Based on Time-Entangled Photons and its Key-Rate Promise [24.07745562101555]
Time-entanglement-based QKD promises to increase the secret key rate and distribution compared to other QKD implementations.
We overview state-of-the-art from the information and coding theory perspective.
arXiv Detail & Related papers (2023-03-03T14:40:40Z) - Data post-processing for the one-way heterodyne protocol under
composable finite-size security [62.997667081978825]
We study the performance of a practical continuous-variable (CV) quantum key distribution protocol.
We focus on the Gaussian-modulated coherent-state protocol with heterodyne detection in a high signal-to-noise ratio regime.
This allows us to study the performance for practical implementations of the protocol and optimize the parameters connected to the steps above.
arXiv Detail & Related papers (2022-05-20T12:37:09Z) - Unbalanced-basis-misalignment tolerant measurement-device-independent
quantum key distribution [22.419105320267523]
Measurement-device-independent quantum key distribution (MDIQKD) is a revolutionary protocol since it is physically immune to all attacks on the detection side.
Some protocols release part of the assumptions in the encoding system to keep the practical security, but the performance would be dramatically reduced.
We present a MDIQKD protocol that requires less knowledge of encoding system to combat the troublesome modulation errors and fluctuations.
arXiv Detail & Related papers (2021-08-27T02:16:20Z) - Composably secure data processing for Gaussian-modulated continuous
variable quantum key distribution [58.720142291102135]
Continuous-variable quantum key distribution (QKD) employs the quadratures of a bosonic mode to establish a secret key between two remote parties.
We consider a protocol with homodyne detection in the general setting of composable finite-size security.
In particular, we analyze the high signal-to-noise regime which requires the use of high-rate (non-binary) low-density parity check codes.
arXiv Detail & Related papers (2021-03-30T18:02:55Z) - Round-robin differential phase-time-shifting protocol for quantum key
distribution: theory and experiment [58.03659958248968]
Quantum key distribution (QKD) allows the establishment of common cryptographic keys among distant parties.
Recently, a QKD protocol that circumvents the need for monitoring signal disturbance, has been proposed and demonstrated in initial experiments.
We derive the security proofs of the round-robin differential phase-time-shifting protocol in the collective attack scenario.
Our results show that the RRDPTS protocol can achieve higher secret key rate in comparison with the RRDPS, in the condition of high quantum bit error rate.
arXiv Detail & Related papers (2021-03-15T15:20:09Z) - Lightweight authenticated quantum key distribution protocols with key
recycling [0.20767168898581634]
Quantum key distribution (QKD) has been developed for decades and several different QKD protocols have been proposed.
This study proposes three lightweight authenticated QKD protocols with key recycling and shows these proposed protocols are robust under the collective attack.
arXiv Detail & Related papers (2021-02-03T05:02:49Z) - Twin-field quantum key distribution with passive-decoy state [22.26373392802507]
We propose passive-decoy based TF-QKD, in which we combine TF-QKD with the passive-decoy method.
We present a simulation comparing the key generation rate with that in active-decoy, the result shows our scheme performs as good as active decoy TF-QKD.
arXiv Detail & Related papers (2020-11-15T04:02:48Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.