中国物理B ›› 2011, Vol. 20 ›› Issue (10): 100305-100305.doi: 10.1088/1674-1056/20/10/100305

• GENERAL • 上一篇    下一篇

A practical two-way system of quantum key distribution with untrusted source

陈明娟, 刘翔   

  1. Key Laboratory of Low-Dimensional Quantum Structures and Quantum Control of Ministry of Education, and Department of Physics, Hunan Normal University, Changsha 410081, China
  • 收稿日期:2010-11-05 修回日期:2011-04-17 出版日期:2011-10-15 发布日期:2011-10-15
  • 基金资助:
    Project supported by the National Natural Science Foundation of China (Grant No. 11074072).

A practical two-way system of quantum key distribution with untrusted source

Chen Ming-Juan(陈明娟) and Liu Xiang(刘翔)   

  1. Key Laboratory of Low-Dimensional Quantum Structures and Quantum Control of Ministry of Education, and Department of Physics, Hunan Normal University, Changsha 410081, China
  • Received:2010-11-05 Revised:2011-04-17 Online:2011-10-15 Published:2011-10-15
  • Supported by:
    Project supported by the National Natural Science Foundation of China (Grant No. 11074072).

摘要: The most severe problem of a two-way "plug-and-play" (p & p) quantum key distribution system is that the source can be controlled by the eavesdropper. This kind of source is defined as an üntrusted source". This paper discusses the effects of the fluctuation of internal transmittance on the final key generation rate and the transmission distance. The security of the standard BB84 protocol, one-decoy state protocol, and weak+vacuum decoy state protocol, with untrusted sources and the fluctuation of internal transmittance are studied. It is shown that the one-decoy state is sensitive to the statistical fluctuation but weak+vacuum decoy state is only slightly affected by the fluctuation. It is also shown that both the maximum secure transmission distance and final key generation rate are reduced when Alice's laboratory transmittance fluctuation is considered.

Abstract: The most severe problem of a two-way "plug-and-play" (p & p) quantum key distribution system is that the source can be controlled by the eavesdropper. This kind of source is defined as an üntrusted source". This paper discusses the effects of the fluctuation of internal transmittance on the final key generation rate and the transmission distance. The security of the standard BB84 protocol, one-decoy state protocol, and weak+vacuum decoy state protocol, with untrusted sources and the fluctuation of internal transmittance are studied. It is shown that the one-decoy state is sensitive to the statistical fluctuation but weak+vacuum decoy state is only slightly affected by the fluctuation. It is also shown that both the maximum secure transmission distance and final key generation rate are reduced when Alice's laboratory transmittance fluctuation is considered.

Key words: statistic fluctuation, untrusted source, quantum key distribution

中图分类号:  (Quantum cryptography and communication security)

  • 03.67.Dd
03.67.Hk (Quantum communication)