The reference-frame-independent(RFI)quantum key distribution(QKD)is suitable for satellite-based links by removing the active alignment on the reference frames.However,how the beam wandering influences the performance...The reference-frame-independent(RFI)quantum key distribution(QKD)is suitable for satellite-based links by removing the active alignment on the reference frames.However,how the beam wandering influences the performance of RFI-QKD remains a pending issue in satellite-to-ground links.In this paper,based on the mathematical model for characterizing beam wandering,we present the security analysis for satellite-to-ground RFI-QKD and analytically derive formulas for calculating the secret key rate with beam wandering.Our simulation results show that the performance of RFI-QKD is better than the Bennett–Brassard 1984(BB84)QKD with beam wandering in asymptotic case.Furthermore,the degree of influences of beam wandering is specifically presented for satellite-to-ground RFI-QKD when statistical fluctuations are taken into account.Our work can provide theoretical support for the realization of RFI-QKD using satellite-to-ground links and have implications for the construction of large-scale satellite-based quantum networks.展开更多
The data post-processing scheme based on two-way classical communication(TWCC)can improve the tolerable bit error rate and extend the maximal transmission distance when used in a quantum key distribution(QKD)system.In...The data post-processing scheme based on two-way classical communication(TWCC)can improve the tolerable bit error rate and extend the maximal transmission distance when used in a quantum key distribution(QKD)system.In this study,we apply the TWCC method to improve the performance of reference-frame-independent quantum key distribution(RFI-QKD),and analyze the influence of the TWCC method on the performance of decoy-state RFI-QKD in both asymptotic and non-asymptotic cases.Our numerical simulation results show that the TWCC method is able to extend the maximal transmission distance from 175 km to 198 km and improve the tolerable bit error rate from 10.48%to 16.75%.At the same time,the performance of RFI-QKD in terms of the secret key rate and maximum transmission distance are still greatly improved when statistical fluctuations are considered.We conclude that RFI-QKD with the TWCC method is of practical interest.展开更多
Reference frame independent quantum key distribution(RFI-QKD) allows two legitimate parties to share the common secret keys with the drift of reference frames. In order to reduce the actual requirements of RFI-QKD pro...Reference frame independent quantum key distribution(RFI-QKD) allows two legitimate parties to share the common secret keys with the drift of reference frames. In order to reduce the actual requirements of RFI-QKD protocol on light source and make it more suitable for practical applications, this paper gives a specific description of RFI-QKD protocol with an untrusted source and analyzes the practical security of this protocol based on the two-way "plug and play" structure commonly used in practical systems. In addition, we also investigate the performance of RFI-QKD with an untrusted source considering statistical fluctuations based on Chernoff bound. Using simulations, we compare the secret key rate of RFIQKD with an untrusted source to RFI-QKD with trusted source. The results show that the performance of RFI-QKD with an untrusted source is similar to that of RFI-QKD with trusted source, and the finite data size clearly effects the performance of our protocol.展开更多
In a perfect quantum key distribution(QKD)protocol,quantum states should be prepared and measured with mutually unbiased bases(MUBs).However,in a practical QKD system,quantum states are generally prepared and measured...In a perfect quantum key distribution(QKD)protocol,quantum states should be prepared and measured with mutually unbiased bases(MUBs).However,in a practical QKD system,quantum states are generally prepared and measured with imperfect MUBs using imperfect devices,possibly reducing the secret key rate and transmission distance.To analyze the security of a QKD system with imperfect MUBs,we propose virtual MUBs to characterize the quantum channel against collective attack,and analyze the corresponding secret key rate under imperfect state preparation and measurement conditions.More generally,we apply the advantage distillation method for analyzing the security of QKD with imperfect MUBs,where the error tolerance and transmission distance can be sharply improved.Our analysis method can be applied to benchmark and standardize a practical QKD system,elucidating the security analysis of different QKD protocols with imperfect devices.展开更多
Twin-field quantum key distribution(TF-QKD)is a disruptive innovation which is able to overcome the rate-distance limit of QKD without trusted relays.Since the proposal of the first TF-QKD protocol,theoretical and exp...Twin-field quantum key distribution(TF-QKD)is a disruptive innovation which is able to overcome the rate-distance limit of QKD without trusted relays.Since the proposal of the first TF-QKD protocol,theoretical and experimental breakthroughs have been made to enhance its ability.However,there still exist some practical issues waiting for settlement.In this paper,we examine the performances of asymmetric TF-QKD protocol with unstable light sources and limited data sizes.The statistical fluctuations of the parameters are estimated employing Azuma’s inequality.Through numerical simulations,we compare the secret key rates of the asymmetric TF-QKD protocol with different data sizes and variant intensity fluctuation magnitudes.Our results demonstrate that both statistical and intensity fluctuations have significant impacts on the performance of asymmetric TF-QKD.展开更多
基金Project supported by the National Natural Science Foundation of China (Grant Nos.61505261,62101597,61605248,and 61675235)the National Key Research and Development Program of China (Grant No.2020YFA0309702)+2 种基金the China Postdoctoral Science Foundation (Grant No.2021M691536)the Natural Science Foundation of Henan Province,China (Grant Nos.202300410534 and 202300410532)the Fund of the Anhui Initiative in Quantum Information Technologies。
文摘The reference-frame-independent(RFI)quantum key distribution(QKD)is suitable for satellite-based links by removing the active alignment on the reference frames.However,how the beam wandering influences the performance of RFI-QKD remains a pending issue in satellite-to-ground links.In this paper,based on the mathematical model for characterizing beam wandering,we present the security analysis for satellite-to-ground RFI-QKD and analytically derive formulas for calculating the secret key rate with beam wandering.Our simulation results show that the performance of RFI-QKD is better than the Bennett–Brassard 1984(BB84)QKD with beam wandering in asymptotic case.Furthermore,the degree of influences of beam wandering is specifically presented for satellite-to-ground RFI-QKD when statistical fluctuations are taken into account.Our work can provide theoretical support for the realization of RFI-QKD using satellite-to-ground links and have implications for the construction of large-scale satellite-based quantum networks.
基金supported by the National Natural Science Foundation of China(Grant Nos.61505261,62101597,61605248,and 61675235)the National Key Research and Development Program of China(Grant No.2020YFA0309702)+2 种基金the China Postdoctoral Science Foundation(Grant No.2021M691536)the Natural Science Foundation of Henan Province(Grant Nos.202300410534 and 202300410532)the Anhui Initiative in Quantum Information Technologies.
文摘The data post-processing scheme based on two-way classical communication(TWCC)can improve the tolerable bit error rate and extend the maximal transmission distance when used in a quantum key distribution(QKD)system.In this study,we apply the TWCC method to improve the performance of reference-frame-independent quantum key distribution(RFI-QKD),and analyze the influence of the TWCC method on the performance of decoy-state RFI-QKD in both asymptotic and non-asymptotic cases.Our numerical simulation results show that the TWCC method is able to extend the maximal transmission distance from 175 km to 198 km and improve the tolerable bit error rate from 10.48%to 16.75%.At the same time,the performance of RFI-QKD in terms of the secret key rate and maximum transmission distance are still greatly improved when statistical fluctuations are considered.We conclude that RFI-QKD with the TWCC method is of practical interest.
基金Project supported by the National Basic Research Program of China(Grant No.2013CB338002)the National Natural Science Foundation of China(Grant Nos.61505261,61675235,61605248,and 11304397)。
文摘Reference frame independent quantum key distribution(RFI-QKD) allows two legitimate parties to share the common secret keys with the drift of reference frames. In order to reduce the actual requirements of RFI-QKD protocol on light source and make it more suitable for practical applications, this paper gives a specific description of RFI-QKD protocol with an untrusted source and analyzes the practical security of this protocol based on the two-way "plug and play" structure commonly used in practical systems. In addition, we also investigate the performance of RFI-QKD with an untrusted source considering statistical fluctuations based on Chernoff bound. Using simulations, we compare the secret key rate of RFIQKD with an untrusted source to RFI-QKD with trusted source. The results show that the performance of RFI-QKD with an untrusted source is similar to that of RFI-QKD with trusted source, and the finite data size clearly effects the performance of our protocol.
基金supported by the National Safety Academic Fund(Grant No.U2130205)the National Natural Science Foundation of China(Grant Nos.62371244,and 62171424)the Natural Science Foundation of Henan(Grant No.242300421219)。
文摘In a perfect quantum key distribution(QKD)protocol,quantum states should be prepared and measured with mutually unbiased bases(MUBs).However,in a practical QKD system,quantum states are generally prepared and measured with imperfect MUBs using imperfect devices,possibly reducing the secret key rate and transmission distance.To analyze the security of a QKD system with imperfect MUBs,we propose virtual MUBs to characterize the quantum channel against collective attack,and analyze the corresponding secret key rate under imperfect state preparation and measurement conditions.More generally,we apply the advantage distillation method for analyzing the security of QKD with imperfect MUBs,where the error tolerance and transmission distance can be sharply improved.Our analysis method can be applied to benchmark and standardize a practical QKD system,elucidating the security analysis of different QKD protocols with imperfect devices.
基金supported by National Natural Science Foundation of China(61675235,61605248 and 61505261)National Key Research and Development Program of China(2016YFA0302600)。
文摘Twin-field quantum key distribution(TF-QKD)is a disruptive innovation which is able to overcome the rate-distance limit of QKD without trusted relays.Since the proposal of the first TF-QKD protocol,theoretical and experimental breakthroughs have been made to enhance its ability.However,there still exist some practical issues waiting for settlement.In this paper,we examine the performances of asymmetric TF-QKD protocol with unstable light sources and limited data sizes.The statistical fluctuations of the parameters are estimated employing Azuma’s inequality.Through numerical simulations,we compare the secret key rates of the asymmetric TF-QKD protocol with different data sizes and variant intensity fluctuation magnitudes.Our results demonstrate that both statistical and intensity fluctuations have significant impacts on the performance of asymmetric TF-QKD.