In practical quantum key distribution systems, there inevitably exist errors in the quantum state preparation process due to imperfections in realistic equipment and devices. Those errors would lead to some security loopholes in the quantum key distribution systems. According to the work of Tamaki et al. (<ext-link ext-link-type="uri" xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://doi.org/10.1103/PhysRevA.90.0523142014"><i>Phys. Rev. A</i> <b>90</b> 052314</ext-link>), here in this work we propose a state preparation error tolerant quantum key distribution protocol through using heralded single-photon sources. In this protocol, we characterize the size of the error in the preparation state of Alice and bring it into the security analysis, thereby avoiding possible security loopholes and improving the security of the system. Moreover, we take the three-intensity decoy-state method for example to introduce the method of constructing the model and estimating the parameters, and carry out corresponding numerical simulations. We make a comparison between the loss tolerant protocol with weak coherent source (WCS) and our present protocol using heralded single-photon source (HSPS). Simulation results show that under the same state preparation error, the key generation rate of the protocol based on WCS is higher than that of protocol based on HSPS at short transmission distances (e.g. less than 150 km). The main reason is that the detection efficiency of the local detector used in the latter scheme is low. However, in the case of long transmission distances (e.g. greater than 200 km), the key generation rate of scheme with WCS drops deeply, while the decline of the key generation rate of the present scheme is much flatter. As a result, the former can no longer generate keys after 211 km, while the latter can transmit a maximum distance of 228 km. Moreover, we also make a comparison between the present scheme and the GLLP protocol with HSPS. The simulation results show that the GLLP protocol with HSPS is very sensitive to the state preparation error and its key generation rate will rapidly decrease with the increase of the state preparation error. On the contrary, our present protocol shows almost no performance degradation under practical state preparation errors. It thus verify the robustness against the state preparation errors of our present work. In addition, in principle, the method can also be combined with the measurement-device-independent quantum key distribution protocol and the twin-field quantum key distribution protocol to further increase the secure communication transmission distance that the present system can reach. Therefore, this work may provide an important reference value for the practical application of long-distance quantum secure communication in the near future.
Read full abstract