J4 ›› 2010, Vol. 27 ›› Issue (5): 565-572.

• Quantum Optics • Previous Articles     Next Articles

Study on BB84-decoy-state quantum key distribution with a heralded single photon source

ZHOU Yuanyuan, LI Xiaoqiang, ZHOU Xuejun   

  1. Electronic Engineering College, Naval University of Engineering, Wuhan 430033,China
  • Received:2009-11-11 Revised:2010-01-14 Published:2010-09-28 Online:2010-08-31

Abstract:

Based on the model of quantum key distribution (QKD) system with a heralded single photon source (HSPS), three typical BB84-decoy-state methods are introduced including active decoy-state protocol, passive decoy-state protocol and the protocol combining active decoy-state idea and passive decoy-tate idea. The performance and implementation difficulty of the three decoy-state methods are analyzed with numerical simulation. The conclusion is that the key generation rate of BB84 decoy-state protocol is increased by the passive decoy idea. Passive decoy-state method proposed by Adachi, Yamamoto, Koashi and Imoto (AYKI) is easy to implement and is speedy to distribute keys because there is no need to prepare decoy states actively. Furthermore, the performance of the AYKI protocol is close to that of the infinite decoy-state protocol. The performance of the method combining active decoy-state idea and passive decoy-tate idea is better than that of AYKI protocol, but there is not much room left for improvement after the AYKI protocol has been implemented.

Key words: quantum optics, quantum key distribution, active decoy state, pasive decoy state, heralded single photon source