Advertisement

Effect of intensity modulator extinction on practical quantum key distribution system

  • J.Z. HuangEmail author
  • Z.Q. Yin
  • S. Wang
  • H.W. Li
  • W. Chen
  • Z.F. Han
Regular Article

Abstract

We study how the imperfection of intensity modulator effects on the security of a practical quantum key distribution system. The extinction ratio of the realistic intensity modulator is considered in our security analysis. We show that the secret key rate increases, under the practical assumption that the indeterminable noise introduced by the imperfect intensity modulator can not be controlled by the eavesdropper.

Keywords

Quantum Information 

References

  1. 1.
    C.H. Bennet, G. Brassard, in Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India (IEEE, New York, 1984), pp. 175–179Google Scholar
  2. 2.
    D. Mayers, J. ACM 48, 351 (2004)MathSciNetCrossRefGoogle Scholar
  3. 3.
    P.W. Shor, J. Preskill, Phys. Rev. Lett. 85, 441 (2000)ADSCrossRefGoogle Scholar
  4. 4.
    R. Renner, N. Gisin, B. Kraus, Phys. Rev. A 72, 012332 (2005)ADSCrossRefGoogle Scholar
  5. 5.
    R. García-Patrón, N. Cerf, Phys. Rev. Lett. 97, 190503 (2006)ADSCrossRefGoogle Scholar
  6. 6.
    A. Leverrier, P. Grangier, Phys. Rev. Lett. 102, 180504 (2009)ADSCrossRefGoogle Scholar
  7. 7.
    D. Gottesman, H.-K. Lo, N. Lütkenhaus, J. Preskill, Quant. Inf. Comput. 4, 325 (2004)zbMATHGoogle Scholar
  8. 8.
    F. Grosshans, N.J. Cerf, Phys. Rev. Lett. 92, 047905 (2004)ADSCrossRefGoogle Scholar
  9. 9.
    R. Renner, J.I. Cirac, Phys. Rev. Lett. 102, 110504 (2009)ADSCrossRefGoogle Scholar
  10. 10.
    L. Lydersen et al., Nat. Photon. 4, 686 (2010)ADSCrossRefGoogle Scholar
  11. 11.
    V. Scarani et al., Rev. Mod. Phys. 81, 1301 (2009)ADSCrossRefGoogle Scholar
  12. 12.
    W.-Y. Hwang, Phys. Rev. Lett. 91, 057901 (2003)ADSCrossRefGoogle Scholar
  13. 13.
    X.-B. Wang, Phys. Rev. Lett. 94, 230503 (2005)ADSCrossRefGoogle Scholar
  14. 14.
    H.-K. Lo, X. Ma, K. Chan, Phys. Rev. Lett. 94, 230504 (2005)ADSCrossRefGoogle Scholar
  15. 15.
    X. Ma, B. Qi, Y. Zhao, H.-K. Lo, Phys. Rev. A 72, 012326 (2005)ADSCrossRefGoogle Scholar
  16. 16.
    H.-W. Li et al., Quant. Inf. Comput. 10, 771 (2010)zbMATHGoogle Scholar
  17. 17.
    H.-W. Li et al., Quant. Inf. Comput. 11, 937 (2011)zbMATHGoogle Scholar
  18. 18.
    T.-Y. Chen et al., Opt. Express 18, 27217 (2010)ADSCrossRefGoogle Scholar
  19. 19.
    H.-K. Lo, J. Preskill, arXiv:quant-ph/0504209v1Google Scholar
  20. 20.
    G. Brassard, L. Salvail, in Advances in Cryptology EUROCRYPT ’93, Lecture Notes in Computer Science, edited by T. Helleseth (Springer, Berlin, 1994), Vol. 765, pp. 410–423Google Scholar
  21. 21.
    S. Wang et al., Opt. Lett. 35, 142454 (2010)ADSGoogle Scholar

Copyright information

© EDP Sciences, SIF, Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • J.Z. Huang
    • 1
    Email author
  • Z.Q. Yin
    • 1
  • S. Wang
    • 1
  • H.W. Li
    • 1
  • W. Chen
    • 1
  • Z.F. Han
    • 1
  1. 1.Key Laboratory of Quantum Information, University of Science and Technology of ChinaHefeiP.R. China

Personalised recommendations