Abstract

Recently, the twin field quantum key distribution (TF-QKD) protocols have been investigated extensively. In particular, an efficient protocol for TF-QKD with sending or not sending the coherent state has been given in. Here in this paper, we present results of practical sending-or-not-sending (SNS) twin field quantum key distribution. In real-life implementations, we need consider the following three requirements, a few different intensities rather than infinite number of different intensities, a phase slice of appropriate size rather than infinitely small size and the statistical fluctuations. We first show the decoy-state method with only a few different intensities and a phase slice of appropriate size. We then give a statistical fluctuation analysis for the decoy-state method. Numerical simulation shows that, the performance of our method is comparable to the asymptotic case for which the key size is large enough. Our method can beat the PLOB bound on secret key capacity. Our results show that practical implementations of the SNS quantum key distribution can be both secure and efficient.

Highlights

  • Quantum key distribution (QKD) allows two parties, Alice and Bob, to share unconditional secret keys based on the laws of quantum physics[1,2,3,4,5,6], even in the presence of an eavesdropper, Eve

  • A milestone breakthrough was made under the name of twin-field quantum key distribution (TF-QKD)[45] for long distance QKD with a key rate scales in square root of channel transmittance

  • We need consider the situations with a few different intensities rather than infinite number of different intensities, a phase slice of appropriate size and the statistical fluctuations

Read more

Summary

Introduction

Quantum key distribution (QKD) allows two parties, Alice and Bob, to share unconditional secret keys based on the laws of quantum physics[1,2,3,4,5,6], even in the presence of an eavesdropper, Eve. By using the decoy-state method[10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25], it has been shown that the unconditional security of QKD can still be assured with an imperfect single-photon source. The decoy-state MDI-QKD can remove all detector side-channel attacks with imperfect single-photon sources[28,29,30,31,32,33]. We reveal the decoy-state method with only a few different intensities and a phase slice of appropriate size to estimate the lower bound of the yield and the upper bound of the phase-flip error rate for the single-photon mail.tsinghua.edu.cn) www.nature.com/scientificreports/. In order to improve the results, the instances for basis unmatched are used to estimate the lower bound of the yield for the single-photon state, such as in Eq (1)

Methods
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call