J4 ›› 2010, Vol. 27 ›› Issue (5): 565-572.

• 量子光学 • 上一篇    下一篇

基于预报单光子源的BB84诱惑态量子密钥分配研究

周媛媛, 李晓强, 周学军   

  1. 海军工程大学电子工程学院,湖北 武汉 430033
  • 收稿日期:2009-11-11 修回日期:2010-01-14 出版日期:2010-09-28 发布日期:2010-08-31
  • 通讯作者: 周学军,(1962-),男,甘肃武威人,教授,博士生导师,研究方向:量子保密通信、海缆与光通信等。 E-mail:zhouxuejun@163.com.
  • 作者简介:周媛媛,(1979-),女,湖南桃源人,海军工程大学电子工程学院博士,研究方向:量子信息、光纤量子密码通信等。E_mail:zyy_hjgc@yahoo.com.cn.
  • 基金资助:

    国家高技术研究发展计划(863计划)资助项目(2009AAJ128)

Study on BB84-decoy-state quantum key distribution with a heralded single photon source

ZHOU Yuanyuan, LI Xiaoqiang, ZHOU Xuejun   

  1. Electronic Engineering College, Naval University of Engineering, Wuhan 430033,China
  • Received:2009-11-11 Revised:2010-01-14 Published:2010-09-28 Online:2010-08-31

摘要:

结合预报单光子源的量子密钥分配系统模型,介绍了三种典型的BB84诱惑态方案:主动诱惑态方案,被动诱惑态方案以及主动诱惑态思想和被动诱惑态思想相结合的方案。结合数值仿真深入分析了三种方案在性能、实现难度等方面的优缺点。结论表明被动诱惑态思想可以进一步提高BB84诱惑态方案的密钥生成效率;BB84被动诱惑态方案(AYKI方案)由于无需主动制备诱惑态,所以实现最为简单,密钥分配速度快,且方案性能趋近于无穷诱惑态的理论极限值;主动诱惑态思想和被动诱惑态思想相结合的方案性能虽然稍优于AYKI方案,但是改善空间很小。

关键词: 量子光学, 量子密钥分配, 主动诱惑态, 被动诱惑态, 预报单光子源

Abstract:

Based on the model of quantum key distribution (QKD) system with a heralded single photon source (HSPS), three typical BB84-decoy-state methods are introduced including active decoy-state protocol, passive decoy-state protocol and the protocol combining active decoy-state idea and passive decoy-tate idea. The performance and implementation difficulty of the three decoy-state methods are analyzed with numerical simulation. The conclusion is that the key generation rate of BB84 decoy-state protocol is increased by the passive decoy idea. Passive decoy-state method proposed by Adachi, Yamamoto, Koashi and Imoto (AYKI) is easy to implement and is speedy to distribute keys because there is no need to prepare decoy states actively. Furthermore, the performance of the AYKI protocol is close to that of the infinite decoy-state protocol. The performance of the method combining active decoy-state idea and passive decoy-tate idea is better than that of AYKI protocol, but there is not much room left for improvement after the AYKI protocol has been implemented.

Key words: quantum optics, quantum key distribution, active decoy state, pasive decoy state, heralded single photon source