Abstract

In this paper, we provide a simple approach for determining the rate of secure key production when single-photon and two-photon pulses are used to generate the secure key. For both BB84 and SARG04, we offer estimation and optimization of decoy-state parameters for a single decoy state protocol and two decoy state protocols. This method can be used to determine the lower bound on the fraction of single-photon counts ([Formula: see text]), the fraction of two-photon counts ([Formula: see text]), the upper bound on the QBER of single-photon pulses ([Formula: see text]), the upper bound on the QBER of two-photon pulses ([Formula: see text]), and the lower bound on the key generation rate for both BB84 and SARG04. Due to the limited data size in real-world experiments, we estimate the statistical fluctuations of several parameters, including the gain and QBER of the signal state, as well as the gain and QBER of the decoy state, which are used to estimate the lower bound of key generation rate. We propose formulae that specify the optimal decoy and signal state percentages and intensities. Then we can determine the maximum and optimal key generation rate. For both SARG04 and BB84, we simulated a free space-based QKD system using our decoy state strategy. The simulation results show that free space-based QKD systems that use the suggested approach for BB84 can achieve a higher secret key rate and a greater safe distance than SARG04-based systems.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.