Decoy-pulse Protocol for Frequency-coded Quantum Key Distribution

We propose a decoy-pulse protocol for frequency-coded implementation of B92 quantum key distribution protocol. A direct extension of decoy-pulse method to frequency-coding scheme results in security loss as an eavesdropper can distinguish between signal and decoy pulses by measuring the carrier photon number without affecting other statistics. We overcome this problem by optimizing the ratio of carrier photon number of decoy-to-signal pulse to be as close to unity as possible. In our method the switching between signal and decoy pulses is achieved by changing the amplitude of RF signal as opposed to modulating the intensity of optical signal thus reducing system cost. We find an improvement by a factor of 100 approximately in the key generation rate using decoy-state protocol. We also study the effect of source fluctuation on key rate. Our simulation results show a key generation rate of 1.5×10-4/pulse for link lengths up to 70km. Finally, we discuss the optimum value of average photon number of signal pulse for a given key rate while also optimizing the carrier ratio.





References:
[1] W. Y. Hwang, "Quantum key distribution with high loss: Toward global
secure communication," Phys. Rev. Lett., vol. 91, no. 057901, 2003.
[2] J. M. Merolla et al., "Phase-modulation transmission system for quantum
cryptography," Opt. Lett., vol. 24, 1999.
[3] P. Kumar and A. Prabhakar, "Bit error rates in a frequency coded quantum
key distribution system," Optics Communications, vol. 282, no. 18, pp.
3827-3833, 2009.
[4] X. Ma et al., "Practical decoy state for quantum key distribution,"
Physical Review A, vol. 72, no. 012326, 2005.
[5] Y. Zhao et al., "Simulation and implementation of decoy state quantum
key distribution over 60 km telecom fiber," in Proceedings of IEEE
International Symposium on Information Theory, 2006, pp. 2094-2098.
[6] D. Gottesman et al., "Security of quantum key distribution with imperfect
devices," Quantum Information and Computation, vol. 4, p. 325, 2004.
[7] G. Brassard and L. Salvail, "Advances in cryptology eurocrypt-93,"
Lecture Notes in Computer Science, vol. 765, pp. 410-423, 1994.
[8] J.-Z. Hu and X.-B. Wang, "Reexamination of the decoy-state quantum key
distribution with an unstable source," Phys. Rev. A, vol. 82, p. 012331,
2010.